Cyber Security data breach Ecuador Elasticsearch hacking news Online security Security

IT Firm Manager Arrested in the Biggest Data Breach Case of Ecuador’s History

Ecuador officials have arrested the general manager of IT consulting firm Novaestrat after the personal details of almost the entire population of the Republic of Ecuador left exposed online in what seems to be the most significant data breach in the country’s history. Personal records of more than 20 million adults and children, both dead […]

business cybersecurity business security Cyber Security hacking news Security

The Definitive RFP Templates for EDR/EPP and APT Protection

Advanced Persistent Threats groups were once considered a problem that concerns Fortune 100 companies only. However, the threat landscape of the recent years tells otherwise—in fact, every organization, regardless of vertical and size is at risk, whether as a direct target, supply chain or collateral damage. The vast majority of security decision-makers acknowledge they need […]

business security cloud application cloud automation Cloud Security cloud server Cyber Security data breach enterprise security hacking news Security

How Cloud-Based Automation Can Keep Business Operations Secure

The massive data breach at Capital One – America’s seventh-largest bank, according to revenue – has challenged many common assumptions about cloud computing for the first time. Ironically, the incident, which exposed some 106 million Capital One customers’ accounts, has only reinforced the belief that the cloud remains the safest way to store sensitive data. […]

Cyber Security hacking android hacking iphone hacking news hacking sim cards mobile phone hacking Security SIM card hacking SimJacker sms hacking

New SIM Card Flaw Lets Hackers Hijack Any Phone Just By Sending SMS

Cybersecurity researchers today revealed the existence of a new and previously undetected critical vulnerability in SIM cards that could allow remote attackers to compromise targeted mobile phones and spy on victims just by sending an SMS. Dubbed “SimJacker,” the vulnerability resides in a particular piece of software, called the S@T Browser, a dynamic SIM toolkit […]

Cyber Security intel chipset intel vulnerability Security side channel attack side channel vulnerability Vulnerability

NetCAT: New Attack Lets Hackers Remotely Steal Data From Intel CPUs

Unlike previous side-channel vulnerabilities disclosed in Intel CPUs, researchers have discovered a new flaw that can be exploited remotely over the network without requiring an attacker to have physical access or any malware installed on a targeted computer. Dubbed NetCAT, short for Network Cache ATtack, the new network-based side-channel vulnerability could allow a remote attacker […]

breach protection CISO Cyber Security cyber security software Cynet data breach Data Protection enterprise security Enterprise Server Security

CISO Kit — Breach Protection in the Palm of Your Hand

CISOs and CIOs need to know better than anyone the security pulse of their organizations. On the other hand, they cannot be flooded with every changing detail. Finding the right balance that enables them to clearly grasp the big picture required in making sound decisions is a task many security executives find challenging. Threat actors […]

best vpn Cyber Security Firefox Firefox Private Network Mozilla Firefox Online security Privacy private vpn secure vpn service Security

Mozilla Launches ‘Firefox Private Network’ VPN Service as a Browser Extension

Mozilla has officially launched a new privacy-focused VPN service, called Firefox Private Network, as a browser extension that aims to encrypt your online activity and limit what websites and advertisers know about you. Firefox Private Network service is currently in beta and available only to desktop users in the United States as part of Mozilla’s […]

Cyber Security D-Link D-Link router hack wifi password hacking news hacking wireless router how to hack password hacking Router hacking Security

Some D-Link and Comba WiFi Routers Leak Their Passwords in Plaintext

What could be worse than your router leaking its administrative login credentials in plaintext? Cybersecurity researchers from Trustwave’s SpiderLabs have discovered multiple security vulnerabilities in some router models from two popular manufacturers—D-Link and Comba Telecom—that involve insecure storage of credentials, potentially affecting every user and system on that network. Researcher Simon Kenin told The Hacker […]

computer virus cyber espionage Cyber Security data exfiltration Middle East Security Stealth Falcon Windows BITS windows malware

New Malware Uses Windows BITS Service to Stealthy Exfiltrate Data

Cybersecurity researchers have discovered a new computer virus associated with the Stealth Falcon state-sponsored cyber espionage group that abuses a built-in component of the Microsoft Windows operating system to stealthily exfiltrate stolen data to attacker-controlled server. Active since 2012, Stealth Falcon is a sophisticated hacking group known for targeting journalists, activists, and dissidents with spyware […]