Security News > 2024 > June

Highlights Complex Tool Landscape: Explore the wide array of cybersecurity tools used by MSPs, highlighting the common challenge of managing multiple systems that may overlap in functionality but...

CDK Global, a software-as-a-service provider for car dealers and auto equipment manufacturers, has suffered a cyberattack that has temporarily disrupted its customers' operations. CDK's platform is used by 15,000+ car dealerships across North America to manage their sales, customer relationships, financing, inventory, customer support, and other aspects of their day-to-day operations.

Interview The ransomware gang responsible for the current healthcare crisis at London hospitals says it has no regrets about the attack, which was entirely deliberate, it told The Register in an interview. SOCRadar said last week how Qilin is known for targeting the healthcare and education sectors not because of politics but because of the reliance they have on uptime and the sensitivity of the data they hold.

Cyber espionage groups associated with China have been linked to a long-running campaign that has infiltrated several telecom operators located in a single Asian country at least since 2021. "The...

Surfshark VPN. Norton Secure VPN. Our rating 4.6 / 5 3.0 / 5 Security protocols OpenVPN, WireGuard, IKEv2 OpenVPN and IKEv2/IPSec No. of servers $3,200 1,000-2,000 VPN server locations 100 countries 28 countries Data breach monitoring Yes Yes Simultaneous device locations Unlimited Up to 10 devices Free trial or free version Mobile free trial None Starting price $2.79 per month $2.49 per month. SEE: How to Use Norton Secure VPN. Norton Secure VPN can also be purchased with other Norton products as part of its Norton 360 bundle of services.

A new Rust-based information stealer malware called Fickle Stealer has been observed being delivered via multiple attack chains with the goal of harvesting sensitive information from compromised...

Cybersecurity researchers have uncovered a new evasive malware loader named SquidLoader that spreads via phishing campaigns targeting Chinese organizations. AT&T LevelBlue Labs, which first...

Passwordless auth methods also lower support costs by eliminating password reset requests and scales easily with a growing user base, while also minimizing internal threats related to password misuse. While passwordless authentication methods like passkeys are simple on the surface for end users, there can be a lot of complexity under-the-hood for developers to handle when they're implementing passkeys.

Organizations have made progress in the past 12 months related to advancing their OT security posture, but there are still critical areas for improvement as IT and OT network environments continue...

74% of cybersecurity professionals globally say that they have taken time off due to work-related mental well-being problems, with staff reporting taking an average of 3.4 sick days per year due to work-related mental well-being problems. 66% of business leaders globally say that the top reasons why cybersecurity professionals are working over their contracted hours are due to increased numbers of cybersecurity threats and unpredictable threats after work hours.