Play ransomware leaked 65,000 government documents
The National Cyber Security Centre (NCSC) of Switzerland has released a report on its analysis of a data breach following a ransomware attack on Xplain, disclosing that the incident impacted thousands of sensitive Federal government files. Xplain is a Swiss technology and software solutions provider for various government departments, administrative units, and even the country’s […]
CISA Warns of Actively Exploited JetBrains TeamCity Vulnerability
Mar 08, 2024NewsroomVulnerability / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting JetBrains TeamCity On-Premises software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability, tracked as CVE-2024-27198 (CVSS score: 9.8), refers to an authentication bypass bug that allows […]
Nigerian National Pleads Guilty of Conspiracy in BEC Operation
Henry Onyedikachi Echefu, one of the three Nigerian men who were involved in an elaborate business email compromise (BEC) scheme, has pleaded guilty to his charges of conspiracy in a US court. Echefu, alongside his conspirators, are residents of South Africa and were involved in the BEC operation from February 2016 to July 2017. He […]
How to Protect Yourself From Identity Theft After a Data Breach
Did you just get word that your personal information may have been caught up in a data breach? If so, you can take steps to protect yourself from harm should your info get into the hands of a scammer or thief. How does that information get collected in the first place? We share personal information with […]
Introducing the Cisco Store Lookbook
80% of the Cisco Store’s merchandise powers an inclusive future for all — but what does that mean? What’s new at the Cisco Store? The Cisco Store has just launched a brand-new Spring 2024 Lookbook per region (AMER, EMEA, and APJC). In these quarterly lookbooks, we will delve further into how our merchandise powers an […]
CISA, NSA share best practices for securing cloud services
The NSA and the Cybersecurity and Infrastructure Security Agency (CISA) have released five joint cybersecurity bulletins containing on best practices for securing a cloud environment. Cloud services have become immensely popular for the enterprise as they provide managed servers, storage, and applications without them having to manage their own infrastructure. Cloud services have become so […]
Chinese State Hackers Target Tibetans with Supply Chain, Watering Hole Attacks
Mar 07, 2024NewsroomCyber Espionage / Software Security The China-linked threat actor known as Evasive Panda orchestrated both watering hole and supply chain attacks targeting Tibetan users at least since September 2023. The end of the attacks is to deliver malicious downloaders for Windows and macOS that deploy a known backdoor called MgBot and a previously […]