Grindr, one of the world's largest dating and social networking apps for gay, bi, trans, and queer people, has fixed a security vulnerability that allowed anyone to hijack and take control of any user's account using only their email address.
No patients were affected, but the incident was another reminder of the risks in the increasingly common assaults on computer networks. A Philadelphia company that sells software used in hundreds of clinical trials, including the crash effort to develop tests, treatments and a vaccine for the coronavirus, was hit by a ransomware attack that has slowed some of those trials over the past two weeks.
Written by Shannon Vavra Oct 1, 2020 | CYBERSCOOP The Department of Defense and the Department of Homeland Security are calling out an unspecified "sophisticated cyber actor" Thursday for using malware to launch cyberattacks against targets in India, Kazakhstan, Kyrgyzstan, Malaysia, Russia and Ukraine.
During the 76 days since Emotet's return, researchers have observed activity reminiscent of past Emotet campaigns, like high message volumes and global distribution. Emotet uses a variety of lure themes, some of which occasionally leverage current events or news items, like COVID-19 or Greta Thunberg.
Update: Thank you all so much for the generous donations! We have met our first goal and are now working towards our larger goal of $10,000. This will provide computers for the labs, and the necessary network setup for the students to learnon. Keep sharing and thank you so much for making this opportunity possible.
Do you work at Venntel, Babel Street, or other company providing location data to the government? Did you used to? Do you know anything else about the sale of location data? We'd love to hear from you.
Ann Johnson, Corporate Vice President, Business Development, Security, Compliance, and Identity at Microsoft, talks about perceptions of cybersecurity with information security researcher, political scientist, author, and Fulbright Scholar Tarah Wheeler. They dive into how security and risk management have ascended within organizations, as well as the importance of looking beyond cybercrime to the people most affected by the fallout.
Attackers are persistent and motivated to continuously evolve - and no platform is immune. That is why Microsoft has been working to extend its industry-leading endpoint protection capabilities beyond Windows.
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are issuing this announcement to help the public recognize and avoid spoofed election-related internet domains during the 2020 election year.
Apple rewarded the researchers for finding some very serious bugs in the company's websites. But for some, the researchers should have been paid more.
A Simple Ransomware Vaccine We see ransomware delete all shadow copies using vssadmin pretty often. What if we could just intercept that request and kill the invoking process? Let's try to create a simple vaccine. We register a debugger for vssadmin.exe which is our compiled raccine.exe.
University Hospital New Jersey in Newark, New Jersey, paid a $670,000 ransomware demand this month to prevent the publishing of 240 GB of stolen data, including patient info. The attack on the hospital occurred in early September by a ransomware operation known as SunCrypt, who infiltrates a network, steals unencrypted files, and then encrypts all of the data.
Professional hackers who already try to hide their activity through an array of technical means now seem to be trying on more corporate disguises, by creating front companies or working as government contractors to boost their legitimacy. U.S.