Home Blog Page 23
It looks like T-Mobile is cursed to encounter frequent security incidents, affecting its customers’ sensitive information. After reporting a security intrusion in August 2021, the American telco giant reportedly again sustained a cyberattack that exposed users’ data and SIM details. T-Mobile...
Enterprises are leveraging cloud infrastructure to modernize their processes, connect disparate services, and improve customer satisfaction rates. Up to 90% of the IT work can be automated using a Cloud platform, and with the inclusion of AI and ML,...
Cybersecurity researchers from Elastic Security uncovered a new malware campaign exploiting valid code signing certificates to evade security defenses and deploy a novel malware loader dubbed Blister. The researchers stated the stealthy malware campaign leverages Blister payload to execute...
Amedia, a leading Norwegian media company, was exposed to a serious data breach resulting in the disruption of its services. In a news release, the company revealed that on the night of Tuesday, December 28, 2021, several of Amedia's central...
It seems that search engine giant Google and Meta, the parent company of Facebook and Instagram, will end 2021 on a bitter note after receiving hefty penalities from the Russian government. A Russian court reportedly penalized Google, 7.2 billion...
Generating CISO buy-in for Active Directory Protection ranks high in a company's success against ransomware attacks. Active Directory (AD) sits at the heart of almost every enterprise network, with more than 90% of businesses using it as their identity...
The U.S.-based photography company Shutterfly confirmed that it had sustained a ransomware attack affecting some of its services, making it the latest victim in the string of ransomware attacks. In an official release, the photography products and image sharing...
Is there any innovation on the horizon that will help companies stem the onslaught of cyber breaches? Yes, there is. It is called “The Cloud,” not to be feared but to embrace with urgency. The cloud offers enterprises a...
Whether it’s a surge in value or a decline, cryptocurrencies always make headlines. In addition to price fluctuations, various crypto-related issues such as cryptomining, illegal crypto transfers, or attacks on crypto exchanges are reported more often. The surge of...
Leveraging counterfeit apps to trick users and deploy malware on the targeted devices is a common attack vector for malware authors. Security experts Cyble recently uncovered a malicious Android application targeting the popular Brazilian banking company Itaú Unibanco. The fake Android...