Ransomware Actor Uses TeamViewer to Gain Initial Access to Networks

January 19, 2024 at 04:48PM TeamViewer is widely used by organizations for remote support and access. However, attackers have exploited it for ransomware deployment. Huntress reported two failed attempts involving initial access via TeamViewer. Past incidents also show TeamViewer’s misuse. TeamViewer has security measures, but incidents often result from weak security practices. The company recommends … Read more

Massive Data Breach at VF Hits 35M Vans, Retail Customers

January 19, 2024 at 04:05PM Apparel conglomerate VF Corporation experienced a data breach in December, compromising personal data of 35.5 million customers. The breach caused disruptions to its operations and led to website slowdowns and order cancellations. The company confirmed minor residual impacts and ongoing investigations but assured that sensitive information like Social Security numbers … Read more

Preventing Data Loss: Backup and Recovery Strategies for Exchange Server Administrators

January 19, 2024 at 06:33AM Summary: The article highlights the rising significance of data in the digital world, particularly in on-premises Exchange Server environments. It elaborates on the evolving threats of data loss, the changing role of administrators, and crucial backup and recovery strategies to prevent permanent data loss. The consequences of data loss and … Read more

IT consultant fined for daring to expose shoddy security

January 19, 2024 at 01:52AM A German security researcher was fined €3,000 for uncovering an e-commerce database vulnerability affecting almost 700,000 customer records. The contractor, Hendrik H., discovered a plain-text password stored in a program file, providing potential access to customer data. Despite initial court support, the Jülich District Court later fined him under Germany’s … Read more

Building AI That Respects Our Privacy

January 18, 2024 at 10:07AM The passage discusses the author’s experience with AI and the need to integrate privacy into AI technologies. The author highlights the potential benefits and risks of AI and suggests steps to protect privacy, such as individualized models, closed systems, transparency, and data removal rights. It also advises current actions to … Read more

MFA Spamming and Fatigue: When Security Measures Go Wrong

January 18, 2024 at 08:03AM Multi-factor authentication (MFA) is increasingly used by organizations to bolster security, as traditional password-only systems are vulnerable to cyberattacks. However, MFA spamming, a tactic where attackers inundate users with verification requests, poses a threat. Mitigation strategies include strong password policies, end-user training, rate limiting, and monitoring systems. Strengthening security measures … Read more

Strength in Numbers: The Case for Whole-of-State Cybersecurity

January 17, 2024 at 10:07AM A recent CloudSEK XVigil report reveals a 95% surge in cyberattacks on government agencies in 2022. The public sector faces greater cybersecurity challenges due to limited resources and widespread personal data. A whole-of-state (WoS) cybersecurity strategy is proposed for collaborative defense, supported by the State and Local Cybersecurity Grant Program. … Read more

Combating IP Leaks into AI Applications with Free Discovery and Risk Reduction Automation

January 17, 2024 at 09:57AM Wing Security introduces a free discovery and a paid tier for automated control over AI SaaS applications, aiming to enhance intellectual property and data protection. 83.2% of companies use GenAI applications, with 99.7% employing AI-powered SaaS. Their solution offers steps to Know, Assess, and Control AI risks while automating workflows … Read more

Achieving “Frictionless Defense” in the Age of Hybrid Networks

January 17, 2024 at 08:30AM The term “frictionless” in cybersecurity acknowledges the lack of a perfect security solution. With a growing cybersecurity workforce shortage and increasingly dispersed networks, the emphasis is on quickly and easily gaining visibility into network activities. Integrations are vital in achieving a “frictionless defense,” particularly in modern distributed infrastructures and cloud … Read more

Locking down the edge

January 16, 2024 at 03:22PM As operational functions move to distributed sites and devices, edge security becomes a growing concern. Hosting data at edge locations presents increased vulnerabilities, especially in sectors like healthcare and manufacturing. Edge breaches can have severe consequences and require high-level cybersecurity protection. Dell Technologies’ webinar discusses these challenges and proposes a … Read more