Sat.Mar 20, 2021

article thumbnail

REvil ransomware gang hacked Acer and is demanding a $50 million ransom

Security Affairs

Taiwanese multinational hardware and electronics corporation Acer was victim of a REvil ransomware attack, the gang demanded a $50,000,000 ransom. Taiwanese computer giant Acer was victim of the REvil ransomware attack, the gang is demanding the payment of a $50,000,000 ransom, the largest one to date. Acer is the world’s 6th-largest PC vendor by unit sales as of January 2021, it has more than 7,000 employees (2019) and in 2019 declared 234.29 billion in revenue.

article thumbnail

Microsoft halts rollout of Windows 10 KB5001649 emergency update

Bleeping Computer

Microsoft has paused the Windows 10 KB5001649 cumulative update rollout, likely due to installation issues and reported crashes. Microsoft is now offering the previously released KB5001567 emergency update instead. [.].

138
138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A threat actor exploited 11 zero-day flaws in 2020 campaigns

Security Affairs

A hacking group has employed at least 11 zero-day flaws as part of an operation that took place in 2020 and targeted Android, iOS, and Windows users. Google’s Project Zero security team published a report about the activity of a mysterious hacking group that operated over the course of 2020 and exploited at least 11 zero-day vulnerabilities in its attacks on Android, iOS, and Windows users.

Hacking 135
article thumbnail

Hands on with Google Chrome's new Tab Search feature - Rolling out now

Bleeping Computer

Google is rolling out a new 'Tab Search' feature that allows you to search through your list of open tabs among all open browser windows to find a specific page. [.].

Software 137
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

PRODUCT REVIEW: GreatHorn Cloud Email Security Platform

CyberSecurity Insiders

Today, we are reviewing the GreatHorn Cloud Email Security Platform, an email security solution to protect organizations against phishing attacks and advanced communication threats. Phishing attacks have been growing dramatically in the wake of the COVID-19 pandemic and the resulting massive increase in employees working from home. SOLUTION OVERVIEW.

article thumbnail

Windows Terminal now comes with Windows 10 — That's a good thing

Bleeping Computer

Microsoft is now classifying Windows Terminal as an inbox app, which means that it will now ship by default in upcoming versions of Windows 10. [.].

140
140

More Trending

article thumbnail

Microsoft Edge tests fix for DNS-over-HTTPS performance issues

Bleeping Computer

Microsoft is testing a fix for performance issues in Microsoft Edge's DNS-over-HTTPS feature and has once again enabled a list of suggested DoH servers. [.].

DNS 114
article thumbnail

Resident Evil 8 just the latest game plagued by fake demos and early access scams

Malwarebytes

There’s been a number of scams targeting fans of major upcoming video game releases over the last week or two. Why is this happening, and what can you do to ensure both you and your children avoid such fakeouts? Preview power: the 80s and 90s. Back in the 80s, games reviews were only really found in dedicated gaming magazines like ZZap!64 or Amstrad Action.

Scams 98
article thumbnail

Application Security for builders and creators?—?part 2

Security Boulevard

Application Security for builders and creators?—?part 2. Previously on Application Security for builders and creators?—?Alice and Bob wanted to build a vaccine passport app with go micro-services and a React UI. Claire suggests the team to engineer security into their app with ShiftLeft. Review with AppSec on Zoom. ShiftLeft findings Review on Zoom.

article thumbnail

A Homecoming Queen Was Arrested for Alleged Vote Hacking

WIRED Threat Level

Plus: A mysterious zero-day spree, a high-profile hacker indictment, and more of the week’s top security news.

Hacking 104
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

USENIX Enigma 2021 – Sanghyun Hong’s ‘A Sound Mind In A Vulnerable Body: Practical Hardware Attacks On Deep Learning’

Security Boulevard

Many thanks to USENIX Enigma 2021 for publishing these outstanding conference videos on the YouTube USENIX Channel ; don't miss this erudite 27 video information & cybersecurity event. Permalink. The post USENIX Enigma 2021 – Sanghyun Hong’s ‘A Sound Mind In A Vulnerable Body: Practical Hardware Attacks On Deep Learning’ appeared first on Security Boulevard.

article thumbnail

Small Business Journal: Robert Herjavec on Everything You Need to Know About Herjavec Group’s 2021 Cybersecurity Conversations Report

Herjavec Group

Our Founder and CEO, Robert Herjavec sat down with Small Business Journal’s Chloe Caldwell to discuss his insights on cybersecurity in 2021 and how the most recent Herjavec Group Cybersecurity Conversations Report explores the past year and how to best prepare for the year ahead. Read on to learn “Everything You Need to Know About Herjavec Group’s 2021 Cybersecurity Conversations Report.” 2020 threw every small business owner across the nation for a loop.

article thumbnail

Descartes on AI: I Think, Therefore I Am… Not a Machine

Security Boulevard

Keith Gunderson, a pioneering philosopher of robotics, in his 1964 paper called “Descartes, La Mettrie, Language and Machines” captured this Robert Stoothoff translation of the 1637 Discourse: If there were machines which bore a resemblance to our bodies and imitated our actions as closely as possible for all practical purposes, we should still have two … Continue reading Descartes on AI: I Think, Therefore I Am… Not a Machine ?.

67
article thumbnail

Weekly Update 235

Troy Hunt

A slow start this week as the camera refused to be recognised by any browser. The problem, of course, was that I'd plugged in a new DAC for the replacement speakers ????? Despite the slow start, there's a heap in this week's update on all sorts of different things as I find myself continually drawn in different directions. But that's also what I love about this industry, that there's so much variety and always something to scratch every itch ??

Media 47
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

XKCD ‘Solar System Cartogram’

Security Boulevard

via the comic delivery system monikered Randall Munroe resident at XKCD ! Permalink. The post XKCD ‘Solar System Cartogram’ appeared first on Security Boulevard.

67
article thumbnail

Deconstructing that $69million NFT

Errata Security

"NFTs" have hit the mainstream news with the sale of an NFT based digital artwork for $69 million. I thought I'd write up an explainer. Specifically, I deconstruct that huge purchase and show what actually was exchanged, down to the raw code. (The answer: almost nothing). The reason for this post is that every other description of NFTs describe what they pretend to be.

article thumbnail

USENIX Enigma 2021 – Kate Starbird’s ‘Online Rumors, Misinformation And Disinformation: The Perfect Storm Of COVID-19’

Security Boulevard

Many thanks to USENIX Enigma 2021 for publishing these outstanding conference videos on the YouTube USENIX Channel ; don't miss this erudite 27 video information & cybersecurity event. Permalink. The post USENIX Enigma 2021 – Kate Starbird’s ‘Online Rumors, Misinformation And Disinformation: The Perfect Storm Of COVID-19’ appeared first on Security Boulevard.

article thumbnail

Entrust Appoints SYNNEX Corporation to Meet Data Protection and Encryption Needs Across North America

CyberSecurity Insiders

MINNEAPOLIS–( BUSINESS WIRE )– Entrust , a global leader in trusted identity, payments and data protection, has announced a master distributor agreement with SYNNEX Corporation , a leading provider of distribution, systems design, and integration services for the technology industry, to offer its comprehensive range of Entrust nShield ® hardware security modules (HSMs) and cybersecurity solutions to customers across the United States and Canada.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

USENIX Enigma 2021 – Nicole Fern’s ‘Hardware: A Double-Edged Sword For Security’

Security Boulevard

Many thanks to USENIX Enigma 2021 for publishing these outstanding conference videos on the YouTube USENIX Channel ; don't miss this erudite 27 video information & cybersecurity event. The post USENIX Enigma 2021 – Nicole Fern’s ‘Hardware: A Double-Edged Sword For Security’ appeared first on Security Boulevard.

article thumbnail

Hacking group used 11 zero-days to attack Windows, iOS, Android users

Bleeping Computer

Project Zero, Google's zero-day bug-hunting team, discovered a group of hackers that used 11 zero-days in attacks targeting Windows, iOS, and Android users within a single year. [.].

Hacking 144
article thumbnail

Deconstructing that $69million NFT

Security Boulevard

"NFTs" have hit the mainstream news with the sale of an NFT based digital artwork for $69 million. I thought I'd write up an explainer. Specifically, I deconstruct that huge purchase and show what actually was exchanged, down to the raw code. (The answer: almost nothing). The reason for this post is that every other description of NFTs describe what they pretend to be.