Security News > 2024 > June

Tool Overload: Why MSPs Are Still Drowning with Countless Cybersecurity Tools in 2024
2024-06-20 10:49

Highlights Complex Tool Landscape: Explore the wide array of cybersecurity tools used by MSPs, highlighting the common challenge of managing multiple systems that may overlap in functionality but...

CDK Global cyberattack cripples 15,000 US auto dealerships
2024-06-20 10:41

CDK Global, a software-as-a-service provider for car dealers and auto equipment manufacturers, has suffered a cyberattack that has temporarily disrupted its customers' operations. CDK's platform is used by 15,000+ car dealerships across North America to manage their sales, customer relationships, financing, inventory, customer support, and other aspects of their day-to-day operations.

Qilin: We knew our Synnovis attack would cause a healthcare crisis at London hospitals
2024-06-20 10:29

Interview The ransomware gang responsible for the current healthcare crisis at London hospitals says it has no regrets about the attack, which was entirely deliberate, it told The Register in an interview. SOCRadar said last week how Qilin is known for targeting the healthcare and education sectors not because of politics but because of the reliance they have on uptime and the sensitivity of the data they hold.

Chinese Cyber Espionage Targets Telecom Operators in Asia Since 2021
2024-06-20 10:22

Cyber espionage groups associated with China have been linked to a long-running campaign that has infiltrated several telecom operators located in a single Asian country at least since 2021. "The...

Surfshark vs Norton Secure VPN (2024): Which VPN Is Better?
2024-06-20 10:11

Surfshark VPN. Norton Secure VPN. Our rating 4.6 / 5 3.0 / 5 Security protocols OpenVPN, WireGuard, IKEv2 OpenVPN and IKEv2/IPSec No. of servers $3,200 1,000-2,000 VPN server locations 100 countries 28 countries Data breach monitoring Yes Yes Simultaneous device locations Unlimited Up to 10 devices Free trial or free version Mobile free trial None Starting price $2.79 per month $2.49 per month. SEE: How to Use Norton Secure VPN. Norton Secure VPN can also be purchased with other Norton products as part of its Norton 360 bundle of services.

New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration
2024-06-20 08:09

A new Rust-based information stealer malware called Fickle Stealer has been observed being delivered via multiple attack chains with the goal of harvesting sensitive information from compromised...

Experts Uncover New Evasive SquidLoader Malware Targeting Chinese Organizations
2024-06-20 06:34

Cybersecurity researchers have uncovered a new evasive malware loader named SquidLoader that spreads via phishing campaigns targeting Chinese organizations. AT&T LevelBlue Labs, which first...

From passwords to passkeys: Enhancing security and user satisfaction
2024-06-20 04:00

Passwordless auth methods also lower support costs by eliminating password reset requests and scales easily with a growing user base, while also minimizing internal threats related to password misuse. While passwordless authentication methods like passkeys are simple on the surface for end users, there can be a lot of complexity under-the-hood for developers to handle when they're implementing passkeys.

Improving OT cybersecurity remains a work in progress
2024-06-20 03:30

Organizations have made progress in the past 12 months related to advancing their OT security posture, but there are still critical areas for improvement as IT and OT network environments continue...

Most cybersecurity pros took time off due to mental health issues
2024-06-20 03:00

74% of cybersecurity professionals globally say that they have taken time off due to work-related mental well-being problems, with staff reporting taking an average of 3.4 sick days per year due to work-related mental well-being problems. 66% of business leaders globally say that the top reasons why cybersecurity professionals are working over their contracted hours are due to increased numbers of cybersecurity threats and unpredictable threats after work hours.