Nuclear waste processing facility Sellafield has been fined £332,500 ($440k) by the Office for Nuclear Regulation (ONR) for failing to adhere to cybersecurity standards and putting sensitive nuclear information at risk over four years, from 2019 to 2023. […] Go to Source Author: Bill Toulas
Category Archives: Security
A recently disclosed vulnerability in the Common Unix Printing System (CUPS) open-source printing system can be exploited by threat actors to launch distributed denial-of-service (DDoS) attacks with a 600x amplification factor. […] Go to Source Author: Sergiu Gatlan
Fake trading apps on Google Play and Apple’s App Store lure victims into “pig butchering” scams that have a global reach. […] Go to Source Author: Bill Toulas
The national Dutch police (Politie) says that a state actor was likely behind the data breach it detected last week. […] Go to Source Author: Bill Toulas
Microsoft and the Justice Department have seized over 100 domains used by the Russian ColdRiver hacking group to target United States government employees and nonprofit organizations from Russia and worldwide in spear-phishing attacks. […] Go to Source Author: Sergiu Gatlan
Approximately 5% of all Adobe Commerce and Magento online stores, or 4,275 in absolute numbers, have been hacked in “CosmicSting” attacks. […] Go to Source Author: Bill Toulas
Two Chinese nationals were sentenced to prison for scamming Apple out of more than $2.5 million after exchanging over 6,000 counterfeit iPhones for authentic ones. […] Go to Source Author: Sergiu Gatlan
During a distributed denial-of-service campaign targeting organizations in the financial services, internet, and telecommunications sectors, volumetric attacks peaked at 3.8 terabits per second, the largest publicly recorded to date. The assault consisted of a “month-long” barrage of more than 100 hyper-volumetric DDoS attacks flood. […] Go to Source Author: Ionut Ilascu
A Linux malware named “perfctl” has been targeting Linux servers and workstations for at least three years, remaining largely undetected through high levels of evasion and the use of rootkits. […] Go to Source Author: Bill Toulas
Utilizing a custom dictionaries helps strengthen your password policies. Learn more from Specops Software about how to build custom dictionaries in your Windows Active Directory password policy. […] Go to Source Author: Sponsored by Specops Software
