By

Natioinal Cyber Security Training Academy Corp
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: A blood center that serves hundreds of hospitals in the southeastern U.S. is beginning to recover from a ransomware attack. Critical software systems used to manage daily operations at OneBlood are coming back online about...
Read More
Dive Brief: An attacker gained access to Fortinet customer data stored on a third-party cloud-based shared file drive, the company said in a Thursday blog post. The cybersecurity company did not specify when the intrusion took place.  The breach exposed “a limited number of files” including data related to less than 0.3% of Fortinet customers,...
Read More
Keeper Security failed to show that the domain was registered in bad faith. Cybersecurity company Keeper Security, Inc. has lost a cybersquatting dispute it filed against the domain name keeper .com. The Complainant argued that the domain name was spreading malware. It hired a private investigator who gathered evidence that suggested the domain owner was...
Read More
What is the Cicada ransomware? Cicada (also known as Cicada3301) is sophisticated ransomware written in Rust that has claimed more than 20 victims since its discovery in June 2024. Why is the ransomware called Cicada? The criminals behind Cicada appear to have named it after the mysterious Cicada 3301 puzzles posted on the internet between...
Read More
A cybercriminal claims to have stolen 20 gigabytes of sensitive data from the French tech and consulting giant, Capgemini – but the company is refusing to comment so far The hacker, alias “grep”, posted a new thread on the popular dark web forum, BreachForums, in which they detailed their loot, which allegedly included databases, source...
Read More
Sep 13, 2024Ravie LakshmananFinancial Fraud / Mobile Security Cybersecurity researchers have uncovered a new variant of an Android banking trojan called TrickMo that comes packed with new capabilities to evade analysis and display fake login screens to capture victims’ banking credentials. “The mechanisms include using malformed ZIP files in combination with JSONPacker,” Cleafy security researchers...
Read More
FaceTec’s patented, industry-leading 3D Face Verification and Reverification software anchors digital identity, creating a chain of trust from user onboarding to ongoing authentication on all modern smart devices and webcams. FaceTec’s 3D FaceMaps™ finally make trusted, remote identity verification possible. As the only technology backed by a persistent spoof bounty program and NIST/iBeta Certified Liveness...
Read More
Oracle CTO Larry Ellison took a strong stand on cybersecurity at Oracle CloudWorld 2024, calling passwords a “terrible idea” in need of replacement with biometric security measures. “The idea that we use passwords is a ridiculous idea. It’s obsolete. It’s very dangerous,” Ellison said during his keynote at the company’s flagship event in Las Vegas....
Read More
The Justice Department plans to file criminal charges in the hacking of Donald Trump’s presidential campaign, two law enforcement officials told NBC News. The Trump campaign announced in August that it had been hacked. Later that month, federal officials said that Iran was behind the effort, which was part of an apparent hack-and-leak operation to...
Read More
The Fog ransomware crew has been observed ramping up attack volumes and targeting new, more lucrative verticals in the never-ending search for a pay-out, and may be on its way to becoming one of the more high-profile cyber crime organisations, according to intelligence published by incident responders at Adlumin. Last month, the Adlumin incident responce...
Read More
1 2 3 6,300

GET THE NATIONAL CYBER SECURITY CONSULTING APP

 










How can I help you?
National Cyber Security

FREE
VIEW