Security News

UC San Diego Health Breach Tied to Phishing Attack
2021-07-29 19:16

Authorities at the University of California San Diego Health reported a phishing attack lead to a major breach of its network, which allowed an adversary to gain access to sensitive patient, student and employee data. A Wednesday notice from UCSD Health explains the attack occurred between Dec. 2, 2020 and April 8, 2021 and exposed personal information including full names, addresses, date of birth, email, social security number and the date and cost of medical services.

How to ensure your vendors are cybersecure to protect you from supply chain attacks
2021-07-29 17:36

One expert offers ways to remove the bullseye from supply vendors. In his Help Net Security article, How can a business ensure the security of their supply chain?, Reed specifically focused on Merrit's concern about making sure supply-chain vendors are putting forth the effort to meet security standards.

New destructive Meteor wiper malware used in Iranian railway attack
2021-07-29 16:46

A new file wiping malware called Meteor was discovered used in the recent attacks against Iran's railway system. Unlike ransomware attacks, destructive wiper attacks are not used to generate revenue for the attackers.

SpecterOps BloodHound Enterprise enables organizations to eliminate critical AD attack paths
2021-07-29 02:30

Designed to help organizations proactively and continuously identify, manage and remediate millions of AD Attack Paths, BloodHound Enterprise gives IT Ops and SecOps professionals the tools needed to dramatically and measurably improve AD security posture with minimal effort. As a largely unseen, unmanaged and growing problem for enterprises, AD Attack Paths are used by attackers to gain control of systems and data, impersonate users, abuse legitimate access to non-AD systems and much more.

Best Practices to Thwart Business Email Compromise (BEC) Attacks
2021-07-29 02:17

Business email compromise refers to all types of email attacks that do not have payloads. In a recent study, 71% of organizations acknowledged they had seen a business email compromise attack during the past year.

US Gov Warning: VPN, Network Perimeter Product Flaws Under Constant Attack
2021-07-28 15:28

The U.S. government and its allies are pleading with defenders to pay attention to gaping holes in perimeter-type devices, warning that advanced threat actors are feasting on known security defects in VPN appliances, network product gateways and enterprise cloud applications. In a joint advisory published Wednesday, cybersecurity response agencies from the U.S., the U.K., and Australia called special attention to flaws in network perimeter tech from Citrix, Fortinet, Pulse, F5 Networks and MobileIron.

Where does the SME fit into a supply chain attack?
2021-07-28 05:00

Businesses have connections to other businesses, who supply them with goods, and whom they supply with goods - both parts and software. In many cases, a company has its own supply chain while simultaneously being part of the supply chain for other, probably larger, businesses.

Biden warns 'real shooting war' will be sparked by severe cyber attack
2021-07-28 04:58

United States President Joe Biden has shared his view that a "Real shooting war" could be sparked by a severe cyber attack. "We've seen how cyber threats, including ransomware attacks, increasingly are able to cause damage and disruption to the real world," he said.

Consumers are increasingly concerned about online security and imminent attacks
2021-07-28 03:30

According to a new Sophos Home survey, forty-five percent of consumers say they're more at risk of being hit by an attack now than they were before the pandemic, and 61% believe their household could be the target of an attack in the next year. Many consumers are uninformed about online security.

Stellar Cyber’s AI-driven incident correlation increases attack detection efficiency
2021-07-28 02:45

Stellar Cyber announced a major leap to boost security analyst efficiency to identify attacks earlier. The new incident correlation technology utilizes advanced GraphML algorithms to automatically group and consolidate large volumes of alerts and events into a much smaller number of highly precise and actionable incidents.