Cyber Insurance Won’t Cover Everything
Cyber insurance is still necessary, but coverage is expected to change. AXA will no longer cover ransomware payments for companies in France. This trend is expected to spread.
Cyber Insurance getting more restricted
WordPress Discloses Critical Zero-day in Fancy Product Designer Plugin
A vulnerability in Fancy Product Designer, a WordPress plugin installed on over 17,000 websites has been discovered and is being actively exploited.
WordPress plugin being exploited
Chinese Hackers Using Previously Unknown Backdoor
A new backdoor has been discovered in Windows systems. It collects live data from the compromised system. This malware has been broken down into parts that individually appear harmless making it difficult to detect.
New Windows backdoor discovered
Processor Morphs Its Architecture to Make Hacking Really Hard
From the good news department, researchers developed a computer processor that changes its architecture on the hopes of foiling many types of attacks.
New Architecture Morphs to defeat hacking
Ransomware Attack Hits Nantucket, Martha's Vineyard Ferry Service
Nantucket and Martha’s Vineyard are two islands off the coast of Massachusetts that are major tourist spots. This attack is designed to coincide with the start of the tourist season, a major source of income to the islands.
Ransomware hits tourist ferry service
Tools Alone Are Not The Answer
Everyone has at least one tool on their computer. Yet breaches continue. Why? Cyber protective tools are necessary but are only one part of a holistic cyber protection plan.
Tools alone are not the answer
Vulnerable Protocols Leave Firms Open to Further Compromises
Many companies are using old software with major vulnerabilities. Companies may keep systems facing the internet up to date, but internal systems are something else. A recent survey showed outdated protocols in use at 9 out of 10 companies.
Out-of-date internal protocols aid cybercriminals
Firms Struggle to Secure Multi-cloud Misconfigurations
The move to the cloud was accelerated by the pandemic as way to cope with changing workloads, more remote users and other changes. It did help in many ways. In that rush cyber protections were missed resulting in breaches or information left visible without the need for a breach.
Multi-Cloud environments add to cyber vulnerabilities
Application Attacks Spike as Criminals Target Remote Workers
The rapid transition to the cloud due to the pandemic imposed Work from Home shift gave rise to another major shift; cybercriminals’ focus on remote workers and their additional vulnerabilities.
Remote Workers Targeted by Cybercriminals
CNA Financial Pays $40 Million in Ransom After Cyberattack
Companies of all sizes are vulnerable to ransomware. The $40 million ransom shows the size of the ransom gets bigger as the victim size gets bigger.
CNA Pays $40 Million Ransom
Smishing – The New Phishing
Phishing has been very profitable for cyber criminals with enough people becoming a victim. As more people get wise to these scams, cybercriminals are turning to Smishing, the use of text and SMS messages to the same end.
Cybercriminals Turn to Smishing to Continue Evil Campaigns
New Techniques Emerge for Abusing Windows Services to Gain System Control
An old feature of Window originally designed to improve security is being exploited to elevate privileges. Using this exploit privileges are being elevated to full system level giving cybercriminals full control.
Old Feature of Windows to Improve Security Now Being Exploited
Hundreds of Millions of Dell Computers Potentially Vulnerable to Attack
Five high severity vulnerabilities in Dell notebooks, laptops and tablets have been discovered that have existed since 2009. Once access is gained by any means, these vulnerabilities allow privilege escalation to access anything on the system including the kernel.
Vulnerabilities in Dell Systems Allow Privilege Escalation
Malicious Office 365 Apps Are the Ultimate Insiders
Cybercriminals have found a way to exploit Microsoft Office 365 by getting users to go to their company’s email login page and then install a harmless looking app that gives the cybercriminals full access the users files and emails without the need for a password. It also allows the installation of other malware.
Attackers Gain Password Free Access to Office 365
Fighting Ransomware: A Call for Cryptocurrency Regulation
Ransomware has become a global scourge causing major disruption to businesses, hospitals, police departments, and local governments. Collaboration between government agencies and security firms produced 48 recommendations for combating ransomware.
Government Agencies and Security Firms Unite to Fight Ransomware