ASIC says financial market cyber resiliency remained steady but fell short of target

Firms in Australia’s financial market have continued to be resilient against cyber threats, with improvement rates in cyber resiliency remaining steady, the Australian Securities and Investment Commission (ASIC) reported on…

FBI: Cuba ransomware group hit 49 critical infrastructure organizations

The FBI has released a new notice about the Cuba ransomware, explaining that the group has attacked “49 entities in five critical infrastructure sectors” and made at least $43.9 million…

Sensitive information of 30k Florida healthcare workers exposed in unprotected database

More than 30,000 US healthcare workers’ personal information was recently exposed due to a non-password protected database, according to security researcher Jeremiah Fowler and a team of ethical hackers with…

NSO Group tech reportedly used to hack US officials' iPhones

Written by AJ Vicens Dec 3, 2021 | CYBERSCOOP Nearly a dozen iPhones associated with U.S. State Department employees were hacked using spyware developed by Israel-based NSO Group, Reuters first…

UK Government Fined Over Honors List Data Breach

UK Government Fined Over Honors List Data Breach The UK’s data watchdog has slapped the British government with a hefty fine for exposing the addresses of individuals chosen to receive honors.  The…

What Are Your Top Cloud Security Challenges? Threatpost Poll

We want to know what your biggest cloud security concerns and challenges are, and how your company is dealing with them. Weigh in with our exclusive poll! There are myriad…

Bitdefender Named a 2021 Gartner Peer Insights Customers’ Choice for Endpoint Protection Platforms in North America

The Bitdefender team is excited to share that we have been named a ‘Customers’ Choice’ for North America in the 2021 Peer Insights ‘Voice of the Customer’: Endpoint Protection Platforms…

Compromise assessment or threat hunting? What do organizations need?

Organizations worldwide are undergoing rapid digitization to keep up with the fast-paced world we live in today. While it is a good initiative, cloud computing and remote work setup have…

What Is Privilege Escalation? Definition, Types and Examples

Privilege escalation might be a confusing cybersecurity term for many. That’s why in this article we’re going to shed a little bit more light on this topic. Keep reading to…

Misconfigured Database Leaks Info on 150K E-commerce Buyers

Misconfigured Database Leaks Info on 150K E-commerce Buyers Security researchers have found a misconfigured cloud-hosted database leaking over 300,000 records, including sensitive personal information on e-commerce buyers. A team at Safety…