Only days ago, a message on the BreachForums extortion site threatened to leak one billion records allegedly stolen from the Salesforce systems…
Browsing CategoryUncategorized
Apple bumps RCE bug bounties to $2M to counter commercial spyware vendors
In light of new memory safety features added to Apple’s latest iPhone chips that make entire classes of exploits harder to pull…
Open-source DFIR Velociraptor was abused in expanding ransomware efforts
Velociraptor, the open-source DFIR tool meant to hunt intruders, has itself gone rogue – being picked up by threat actors in coordinated…
Datenleck bei SonicWall betrifft alle Cloud-Backup-Kunden
Der Sicherheitsvorfall bei SonicWall ist umfangreicher als bisher angenommen. Tada Images – shutterstock.com Am 17. September gab der Security-Anbieter SonicWall bekannt, dass…
SonicWall data breach affects all cloud backup customers
On Sept. 17, security vendor SonicWall announced that cybercriminals had stolen backup files configured for cloud backup. At the time, the company claimed…
Identity Management and Information Security News for the Week of October 10th: CyberArk, Semperis, Forcepoint, and More
The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week…
LockBit, DragonForce, and Qilin form a ‘cartel’ to dictate ransomware market conditions
Three of the most notorious ransomware-as-a-service operations have formed a criminal cartel aimed at coordinating attacks and sharing resources in what they…
Lücke in Hotelsoftware legt Kundendaten offen
Die Hotelkette Motel One spielt die Auswirkungen der Sicherheitslücke in der Hotelsoftware herunter. Tobias Arhelger – shutterstock.com IT-Sicherheitsaktivisten des Kollektivs “Zerforschung” entdeckten…
Homeland Security’s reassignment of CISA staff leaves US networks exposed
The US Department of Homeland Security has started reassigning cybersecurity personnel to non-cyber duties tied to deportation and border enforcement priorities. Hundreds…
Your cyber risk problem isn’t tech — it’s architecture
The creation of an ongoing cyber risk management process, aligned with the governance of the information security management process, is a premise…