'

Microsoft Patch Tuesday, August 2023 Edition

Microsoft Patch Tuesday, August 2023 Edition

Microsoft Corp. today issued software updates to plug more than 70 security holes in its Windows operating systems and related products, including multiple zero-day vulnerabilities currently being exploited in the wild. Six of the flaws fixed today earned Microsoft’s “critical” rating, meaning malware or miscreants could use them to install software on a vulnerable Windows … Read more

Microsoft Patch Tuesday for August 2023 fixed 2 actively exploited flaws

Microsoft Patch Tuesday security updates for August 2023 addressed 74 vulnerabilities, including two actively exploited flaws. Microsoft Patch Tuesday security updates for August 2023 addressed 74 new vulnerabilities in multiple products including Windows and Windows Components; Edge (Chromium-Based); Exchange Server; Office and Office Components; .NET and Visual Studio; ASP.NET; Azure DevOps and HDInsights; Teams; and … Read more

Insurance and Cybersecurity Strategy Go Together

Insurance and Cybersecurity Strategy Go Together

Cyber insurance is now the norm, according to new research. A survey from Sophos finds 91% of organizations report having coverage. An additional 8% said while they don’t currently have coverage, they plan to obtain it in the next year.  For those who purchased a cyber insurance policy in the last year, 95% say that the … Read more

Attackers use Cloudflare Tunnel to proxy into victim networks

Attackers use Cloudflare Tunnel to proxy into victim networks

Cloudflare Tunnel is a powerful tunneling solution that gives organizations a way to securely make internal applications and services accessible to external users while benefiting from the defenses and authentication policies enforced by the Cloudflare network. Like most tools that are meant to make infrastructure administration easier and more secure, they can also be abused … Read more

Identity-based security threats are growing rapidly: report

Identity-based security threats are growing rapidly: report

The most dangerous cybersecurity threat of the moment is an attacker with access to legitimate identity information for a given system, according to a report issued today by endpoint security and threat intelligence vendor CrowdStrike. According to the report, interactive intrusions (which the company defines as those in which an attacker is working actively to … Read more

North Korea hacked into Russian missile company: Report

North Korea hacked into Russian missile company: Report

Two North Korean hacker groups had access to the internal systems of a Russian missile and satellite developer NPO Mashinostoyeniya for five to six months in 2022, according to research by cybersecurity firm SentinelOne. Two separate instances of North Korea-related compromises were identified by SentinelLabs — the threat intelligence and malware analysis arm of SentinelOne … Read more

UK Electoral Commission discloses a data breach

UK Electoral Commission discloses a data breach

The UK Electoral Commission suffered a data breach that exposed voters’ personal information between 2014 and 2022. The UK Electoral Commission disclosed a data breach that exposed the personal information of voters in the United Kingdom between 2014 and 2022. The Commission notified the Information Commissioner’s Office. “Today we announced that we have been the … Read more

The industry’s most insightful minds come together at Digital Transformation EXPO Europe (DTX)

The industry’s most insightful minds come together at Digital Transformation EXPO Europe (DTX)

As 2023’s advancements in technology pose more questions than answers, the industry’s most insightful minds come together at Digital Transformation EXPO Europe (DTX) – the home of digital transformation – and UC EXPO (UCX) – the home of customer and workplace tech. Taking place on 4-5 October 2023 at ExCel London, DTX + UCX Europe … Read more

91% of IT leaders better protected with PAM but want more affordable solutions

91% of IT leaders better protected with PAM but want more affordable solutions

Keeper Security released findings from its Privileged Access Management Survey: Deployment Amid Economic Uncertainty. The report explores global insights from IT and security executives, revealing that while IT leaders consider PAM solutions critical to their security stack, cost constraints and complex solutions are impacting deployment. Fifty-six percent of respondents tried to deploy a PAM solution but … Read more

43 Android apps in Google Play with 2.5M installs loaded ads when a phone screen was off

43 Android apps in Google Play with 2.5M installs loaded ads when a phone screen was off

Experts found 43 Android apps in Google Play with 2.5 million installs that displayed advertisements while a phone’s screen was off. Recently, researchers from McAfee’s Mobile Research Team discovered 43 Android apps in Google Play with 2.5 million installs that loaded advertisements while a phone’s screen was off. The experts pointed out that this behavior … Read more