Sensitive information of 30k Florida healthcare workers exposed in unprotected database

More than 30,000 US healthcare workers’ personal information was recently exposed due to a non-password protected database, according to security researcher Jeremiah Fowler and a team of ethical hackers with…

Phishing Actors Are Already Exploiting the Omicron COVID-19 Variant

As you might already know a new covid variant called Omicron has recently started spreading. On 26 November 2021, WHO designated the variant B.1.1.529 a variant of concern, named Omicron, on…

Compromise assessment or threat hunting? What do organizations need?

Organizations worldwide are undergoing rapid digitization to keep up with the fast-paced world we live in today. While it is a good initiative, cloud computing and remote work setup have…

What Is Privilege Escalation? Definition, Types and Examples

Privilege escalation might be a confusing cybersecurity term for many. That’s why in this article we’re going to shed a little bit more light on this topic. Keep reading to…

It's a truly cruel scam. Here's the dramatic way Google is trying to stop it

The call comes. And your instinct is to react instantly. Screenshot by ZDNet We all think we’re invulnerable. Until life events — or callous cyberscamming sorts — prove otherwise. One…

The In-house Zoho ServiceDesk Exploit Used to Drop Webshells

You may recall that we reported a while ago that state-backed advanced persistent threat (APT) organizations had been actively exploiting a significant hole in a Zoho single sign-on and password…

Double Extortion Ransomware: The New Normal

With more and more businesses learning how to avoid paying huge amounts of money to ransomware actors by maintaining up-to-date backups and having disaster recovery plans in place, the number…

Planned Parenthood Breach Opens Patients to Follow-On Attacks

Cyberattackers made off with addresses, insurance information, dates of birth, and most worryingly, clinical information, such as diagnosis, procedures, and/or prescription information. Planned Parenthood’s Los Angeles (PPLA) division has been…

Fake Adobe Windows App Installer Packages Are Distributing the Emotet Malware

Emotet is a malware known as a banking Trojan. Malspam, which are spam emails that contain malware, is the primary means by which it spreads. To persuade consumers, these communications…

What Is Virtual Network Computing (VNC)

VNC, which stands for Virtual Network Computing, is one of several kinds of desktop remote sharing systems available for professionals but also for less tech-savvy home users as well. This…