Mandiant and Google are tracking a new extortion campaign where executives at multiple companies received emails claiming that sensitive data was stolen from their Oracle E-Business Suite systems […] Go to Source Author: Lawrence Abrams
Category Archives: Security
Mandiant and Google are tracking a new extortion campaign where executives at multiple companies received emails claiming that sensitive data was stolen from their Oracle E-Business Suite systems […] Go to Source Author: Lawrence Abrams
A ransomware attack at Motility Software Solutions, a provider of dealer management software (DMS), has exposed the sensitive data of 766,000 customers. […] Go to Source Author: Bill Toulas
Adobe is warning its Analytics customers that an ingestion bug caused data from some organizations to appear in the analytics instances of others for approximately one day. […] Go to Source Author: Lawrence Abrams
A new Android banking and remote access trojan (RAT) dubbed Klopatra disguised as an IPTV and VPN app has infected more than 3,000 devices across Europe. […] Go to Source Author: Bill Toulas
F-Droid is warning that the project could reach an end due to Google’s new requirements for all Android developers to verify their identity. […] Go to Source Author: Bill Toulas
Canadian airline WestJet is informing customers that the cyberattack disclosed in June compromised the personal information of 1.2 million customers, including passports and ID documents. […] Go to Source Author: Bill Toulas
Google has begun rolling out a new AI-powered security feature for Google Drive desktop, which will automatically pause file syncing when it detects a ransomware attack to minimize impact. […] Go to Source Author: Sergiu Gatlan
Allianz Life has completed the investigation into the cyberattack it suffered in July and determined that nearly 1.5 million individuals are impacted. […] Go to Source Author: Bill Toulas
CISA says microsegmentation isn’t optional—it’s foundational to Zero Trust. But legacy methods make it slow & complex. Learn from Zero Networks how modern, automated, agentless approaches make containment practical for every org. […] Go to Source Author: Sponsored by Zero Networks
