Dec 31, 2019 | Cloud Consultancy News
Twitter fetched relevant matching user data upon uploading the contacts through the contacts upload feature on Twitter’s Android app. The researcher took many of the phone numbers of high-profile Twitter users including politicians and officials to a WhatsApp...
Dec 30, 2019 | Cloud Consultancy News
Small businesses often lack the IT staffing resources and expertise that are commonly found in larger organizations. As such, it’s hardly surprising to find that SMB systems–including security systems–may not be configured in quite the way that they should...
Dec 27, 2019 | Cloud Consultancy News
SplashData released their “Worst passwords of 2019” list, which includes the top 25 most dangerous and most commonly leaked passwords. In an interesting turn of events, password has for the first time in the list’s history been knocked out of the top two spots....
Dec 24, 2019 | Cloud Consultancy News
It’s that time of year again. Everyone’s busy – at work and at home. That includes cybercriminals, too. In fact, the holiday season is when busy, distracted people tend to be especially vulnerable to phishing attacks. Just one click on a phishing link in a...
Dec 23, 2019 | Cloud Consultancy News
Author: Brian Krebs Last summer, a wave of sextortion emails began flooding inboxes around the world. The spammers behind this scheme claimed they’d hacked your computer and recorded videos of you watching porn, and promised to release the embarrassing footage to all...
Dec 20, 2019 | Cloud Consultancy News
Zoopla has repelled a cyber attack on its Alto property software – with no breach of customer agents’ personal data. It has sent an email to all its Alto customers, explaining the attack – which led to a temporary break in the service – and outlining...
Dec 19, 2019 | Cloud Consultancy News
Microsoft officials have said the new Chromium-based Edge browser will be generally available starting January 15, 2020. They also said in early November that the new Edge will be bundled with Windows 10 right after the general availability date, though this will...
Dec 18, 2019 | Cloud Consultancy News
Source: ZDNet / Author: Ed Bott Support for Windows 7 ends in just a few weeks. After Jan. 14, 2020, Microsoft will no longer provide free security updates and bug fixes for the venerable operating system to the general public. Those updates will be available,...
Dec 17, 2019 | Cloud Consultancy News
Ransomware, the IT equivalent of kidnapping, is a huge and growing problem. And ransomware attacks, in which bad actors encrypt organizations’ data to bring IT infrastructure and the associated operations to a standstill, are only becoming more widespread. Ransomware...
Dec 16, 2019 | Cloud Consultancy News
Ransomware could be getting even nastier: a security firm is warning over a new trend among some ransomware attackers to not just encrypt data, but steal some of it and use it as leverage to ensure a target pays up. In several recent cases it has been reported that...
Dec 13, 2019 | Cloud Consultancy News
Internet service provider (ISP) and hosting company 1&1 has been fined nearly €10 million ($11m) by Germany’s GDPR watchdog for data protection failures in its call centers. The United Internet subsidiary, which operates across Europe and the Americas, will be...
Dec 12, 2019 | Cloud Consultancy News
On Tuesday Google announced better password protections in Chrome, gradually rolling out with release M79. Here are the details of how they work. Warnings about compromised passwords Google first introduced password breach warnings as a Password Checkup...
Dec 11, 2019 | Cloud Consultancy News
For any business, privacy and security are a constant concern. The variety and velocity of attacks seeking to infiltrate corporate systems and steal vital business and customer information seem never-ending. Given the very public repercussions of certain types of...
Dec 10, 2019 | Cloud Consultancy News
Can you believe another year has passed and we’re approaching the last Patch Tuesday of the year? While I get ready to make another online gift purchase with my credit card, I can’t help but reflect on the security activity over the past twelve months. Some of these...
Dec 9, 2019 | Cloud Consultancy News
At its re:Invent event under way in Las Vegas, Amazon Web Services (AWS) dropped the veil on a new tool to help customers to avoid spewing data stored on its S3 (Simple Storage) service to world+dog. “Access Analyzer for S3 is a new feature that monitors your...
Dec 6, 2019 | Cloud Consultancy News
The web site for UK activewear retailer Sweaty Betty has been hacked to insert malicious code that attempts to steal a customer’s payment information when making purchases. This type of attack is called Magecart and involves a hacker compromising an online site...
Dec 5, 2019 | Cloud Consultancy News
Four Avast and AVG Firefox extensions have been removed from Mozilla Addons Site over concerns of spying of users. “This add-on violates Mozilla’s add-on policy by collecting data without user disclosure or consent,” explained Mozilla. The four extensions developed by...
Dec 4, 2019 | Cloud Consultancy News
Apple stakes a lot of its reputation on how it protects the privacy of its users, as it wants to be the only tech company you trust. But if you send encrypted emails from Apple Mail, there’s currently a way to read some of the text of those emails as if they were...
Dec 3, 2019 | Cloud Consultancy News
Microsoft has decided to retire the Invoicing app in Office 365 in 2020. If you act quickly, you can preserve your customer data and import it to your replacement application. While the issuing of invoices is a fundamental part of the day-to-day activity of any...
Dec 2, 2019 | Cloud Consultancy News
A confidential report from the National Cyber Security Centre (NCSC) in the Netherlands informs that at least 1,800 companies are affected by ransomware across the world. The report names three file-encrypting malware pieces responsible for the infections that use the...
Nov 29, 2019 | Cloud Consultancy News
PhishLabs has observed an active TrickBot campaign targeting the employees of multiple organisations. Trickbot is a sophisticated successor of the Dyre Banking Trojan. It uses an intricate network of command and control servers (C2), web injects, and customized...
Nov 28, 2019 | Cloud Consultancy News
Google’s Threat Analysis Group (TAG) this week shared some data on government-backed hacking and disinformation attempts targteting its customers. Google has been alerting users of state-sponsored hacking attempts for several years and it has sent out thousands of...
Nov 27, 2019 | Cloud Consultancy News
A new strain of mobile banking trojan called Ginp has been constantly refined to collect login credentials and credit card details. Starting in early June as an SMS stealer that delivered the victim’s incoming and outgoing messages to a command and control (C2)...
Nov 26, 2019 | Cloud Consultancy News
Users of some AVG and Avast antivirus software may be prevented from upgrading to the latest version of Windows 10 due to a compatibility issue. Microsoft has blocked upgrades to both Windows 10 versions 1909 and 1903 for AVG and Avast users running version...
Nov 25, 2019 | Cloud Consultancy News
In September, California Governor Jerry Brown signed into law a new bill aimed at regulating the security of IoT devices, and it’s set to go into effect in a few short months on January 1, 2020. While the goal of the law is to better address the risks that increased...
Nov 22, 2019 | Cloud Consultancy News
A new spam campaign pretending to be a ‘Critical Microsoft Windows Update’ has been discovered that attempts to deliver the Cyborg Ransomware, but turns out to be an utter failure. In a report from Trustwave that was released today, researchers outline how...
Nov 21, 2019 | Cloud Consultancy News
The list of routers that have critical RCE bugs, that have reached end of life and that won’t get fixed has grown. D-Link has warned that more of its routers are vulnerable to critical flaws that allow remote hackers to take control of hardware and steal data. The...
Nov 20, 2019 | Cloud Consultancy News
Hackers accessed macys.com’s “Checkout” and “My Wallet” pages early last month and added malicious script to lift shoppers’ personal information, such as credit card data, then send it to a remote site. The company discovered the Oct. 7 hack on Oct. 15 when it...
Nov 19, 2019 | Cloud Consultancy News
Facebook has disclosed the existence of a severe vulnerability leading to remote code execution attacks in WhatsApp messaging software. Last week, the technology giant said in a security advisory that the WhatsApp bug, tracked as CVE-2019-11931, is a stack-based...
Nov 18, 2019 | Cloud Consultancy News
Security researchers have discovered a vulnerability in Ring doorbells that exposed the passwords for the Wi-Fi networks to which they were connected. Bitdefender said the Amazon-owned doorbell was sending owners’ Wi-Fi passwords in cleartext as the doorbell joins...
Nov 15, 2019 | Cloud Consultancy News
All six major browser vendors have plans to support DNS-over-HTTPS (or DoH), a protocol that encrypts DNS traffic and helps improve a user’s privacy on the web. The DoH protocol has been one of the year’s hot topics. It’s a protocol that, when...
Nov 14, 2019 | Cloud Consultancy News
The Equifax breach took place in 2017, but even two years later it is still regarded as one of the worst of all time. The Equifax breach happened because the firm failed to patch a web server, which is itself a very basic error. But now a class action lawsuit shows...
Nov 13, 2019 | Cloud Consultancy News
Cyber risks are the top concern among businesses of all sizes for the first time since the Travelers Companies’ survey began in 2014. Of the 1,200 business leaders who participated in the survey, 55% said they worry some or a great deal about cyber risks, ahead of...
Nov 12, 2019 | Cloud Consultancy News
There’s a significant prevalence and impact of cyberattacks that use stolen hashed administrator credentials, also referred to as Pass the Hash (PtH) attacks, within businesses today, according to a survey from One Identity. Among the survey’s most noteworthy findings...
Nov 11, 2019 | Cloud Consultancy News
While more businesses are investing in security measures like multifactor authentication (MFA), employees still have poor password habits that weaken companies’ overall security posture, according to LastPass. Given that stolen and reused credentials are linked to 80...
Nov 8, 2019 | Cloud Consultancy News
Cybercrime is continuing to mature and becoming more and more bold, shifting its focus to larger and more profitable targets as well as new technologies. Data is the key element in cybercrime, both from a crime and an investigate perspective. These key threats...
Nov 7, 2019 | Cloud Consultancy News
5G is being positioned as a “network of networks” that will encompass public and private components, licensed and unlicensed spectrum, and even expand beyond cellular, to satellite communications. In reality, 5G will only be one component of the enterprise vertical...
Nov 6, 2019 | Cloud Consultancy News
Nearly three-quarters of consumers (74%) would be likely to participate in a cybersecurity awareness or education program from their financial institution if they offered it. The survey conducted by The Harris Poll on behalf of Computer Services also found that an...
Nov 5, 2019 | Cloud Consultancy News
1 in 50 URLs are malicious, nearly one-third of phishing sites use HTTPS and Windows 7 exploits have grown 75% since January. A new Webroot report also highlights the importance of user education, as phishing lures have become more personalized as hackers use stolen...
Nov 4, 2019 | Cloud Consultancy News
For the second year in a row, the majority of employers are failing to equip their employees with the appropriate technologies, procedures and policies to ensure data security across the organization, according to Apricorn. The survey report, which polled nearly 300...
Nov 1, 2019 | Cloud Consultancy News
850,000 domains worldwide now have DMARC records, a 5x increase since 2016, according to Valimail. However, less than 17% of global DMARC records are at enforcement — meaning fake emails that appear to come from those domains are still arriving in recipients’ inboxes....
Oct 31, 2019 | Cloud Consultancy News
There has been a massive uptick in eCrime cyber activity, a CrowdStrike report reveals. As Gartner states in the 2019 Magic Quadrant for Endpoint Protection Platform, “The skills requirement of EDR solutions compounded by the skills gap in most organizations is an...
Oct 30, 2019 | Cloud Consultancy News
Internal user mistakes created the largest percentage of cybersecurity incidents over the past twelve months (80%), followed by exposures caused by poor network system or application security (36%), and external threat actors infiltrating the organization’s network or...
Oct 29, 2019 | Cloud Consultancy News
Nearly three-quarters of consumers (74%) would be likely to participate in a cybersecurity awareness or education program from their financial institution if they offered it. The survey conducted by The Harris Poll on behalf of Computer Services also found that an...
Oct 28, 2019 | Cloud Consultancy News
As the year draws to a close, it is time for businesses across all industries and sectors to reflect and prepare for the upcoming new year. With this in mind, FIRST has produced 11 vital steps that organizations should take to improve their incident response strategy....
Oct 25, 2019 | Cloud Consultancy News
The popularity of Google’s Password Checkup Chrome extension has spurred the company to build the technology into Google Account’s Password Manager and the Chrome browser. Unlike the Chrome extension, these new implementations won’t just point out unsafe...
Oct 24, 2019 | Cloud Consultancy News
Google has announced that it will begin blocking mixed content on https:// pages by default. The reveal was detailed on the Chromium Blog, which stated that the change was being implemented to improve security and privacy. According to the blog, there has been...
Oct 23, 2019 | Cloud Consultancy News
The verdict is in: quantum computing poses an existential threat to asymmetric cryptography algorithms like RSA and ECC that underpin practically all current Internet security. This comes straight from the National Academy of Science’s Committee on Technical...
Oct 22, 2019 | Cloud Consultancy News
Microsoft is planning to block by default 40+ new file types in Outlook on the web to improve the security for their customers. “We took the time to audit the existing blocked file list and update it to better reflect the file types we see as risks today,” the...
Oct 21, 2019 | Cloud Consultancy News
There’s an alarming scale of risks businesses are up against in a time when email is proving an open door for cybercriminals and malicious actors looking to disrupt, exploit and destroy businesses, according to Wire. The report is developed in collaboration with...
Oct 18, 2019 | Cloud Consultancy News
Cloud data breaches are on the rise, demonstrating time and again the need for a different approach and strategy when it comes to managing and monitoring privileged access to cloud ecosystems. Privilege access management (PAM) should: Be risk-aware and intelligent...
Oct 17, 2019 | Cloud Consultancy News
Scammers are using compromised servers and bogus links to lure LinkedIn users into providing their online credentials and payment card details. The team that examined the scam noted that all the other subdomains they analyzed, redirected to various dating site...
Oct 17, 2019 | Cloud Consultancy News
The future of 5G lies in the enterprise, states ABI Research. Use cases across different vertical markets, such as industrial automation, cloud gaming, private Long-Term Evolution (LTE), and smart transport systems, will become pervasive, and will unlock new...
Oct 16, 2019 | Cloud Consultancy News
The M6 Group, France’s largest privately-owned multimedia group, was the victim of ransomware over the weekend, but none of the company’s TV and radio channels suffered any downtime. The incident took place on Saturday morning, according to a message the...
Oct 16, 2019 | Cloud Consultancy News
Victims of the Nemty Ransomware finally have something to be happy about as researchers have released a decryptor that allows them to recover files for free. Since August 2019, the Nemty Ransomware has been utilizing a variety of distribution methods to infect victims...
Oct 15, 2019 | Cloud Consultancy News
Apple’s macOS Catalina (v10.15), a new major release of its desktop operating system, comes with many functional and security and privacy improvements. The former include a new game subscription service, a feature that extends Mac desktops with iPad as a second...
Oct 14, 2019 | Cloud Consultancy News
Six in every ten businesses have experienced a breach in either in the last three years. At least a third of infosec professionals (36%) whose employers had not recently been a victim of a cyber attack also believe that it is likely that they are currently facing one...
Oct 11, 2019 | Cloud Consultancy News
macOS Catalina, which came out on Monday, is the newest version of the operating system that runs on the Mac. Catalina brings some significant changes, including the removal of the iTunes app, a new Sidecar feature, an updated Find My app, and more. This is an...
Oct 10, 2019 | Cloud Consultancy News
Businesses and organisations of all sizes have steadily begun to recognize the importance of cybersecurity to their success. As spending and awareness of the importance of cybersecurity increases, so does the demand for intelligence about how best to spend those funds...
Oct 9, 2019 | Cloud Consultancy News
APT (Advanced persistent threat) actors are targeting the UK and other international organizations in the healthcare sector, educational sector, government, and military. The vulnerabilities exist in several VPN products that allow an attacker to retrieve arbitrary...
Oct 8, 2019 | Cloud Consultancy News
The apparent ease with which SIM hijacking attacks are being perpetrated to get the targets’ second authentication factor for crucial accounts (online banking, cryptocurrency exchange, online wallet) must have raised some doubts about the security of multi-factor...
Oct 7, 2019 | Cloud Consultancy News
After a spate of ransomware attacks on government organizations, the FBI has come up with a new stance on paying up ransomware demands. The latest groups to be targeted by high-value ransomware attacks are hospital organizations in Alabama, USA, and Victoria,...
Oct 4, 2019 | Cloud Consultancy News
Microsoft OneDrive ( It’s not available in Microsoft OneDrive for Business ) users will find a little something extra in the cloud today, with the announcement of the worldwide availability of the Personal Vault feature for OneDrive. The new feature carves out a...
Oct 3, 2019 | Cloud Consultancy News
At yesterdays hardware event, Microsoft took the wraps off a number of new Surface PCs and peripherals, as expected. The new devices, which will be ready to ship this month, feature Intel, AMD, and Arm processors. SURFACE PRO X Surface Pro X is an Arm-based Surface...
Oct 2, 2019 | Cloud Consultancy News
Demant, one of the world’s largest manufacturers of hearing aids, expects to incur losses of up to $95 million following what appears to be a ransomware infection that hit the company at the start of the month. This marks one of the most significant losses...
Oct 1, 2019 | Cloud Consultancy News
The most common domains attackers use to host malware and launch phishing attacks include several subdomains of legitimate sites and Content Delivery Networks (CDNs) such as CloudFlare.net, CloudFront.net (which belongs to Amazon), SharePoint and Amazonaws.com, along...
Sep 30, 2019 | Cloud Consultancy News
More than 99 percent of cyberattacks rely on human interaction to work, Proofpoint recently shared. More often than not, the principal attack method is phishing emails. When hitting enterprises, attackers love to impersonate Microsoft the most, as Office 365 is...
Sep 27, 2019 | Cloud Consultancy News
People using mobile apps to book hotel rooms for their vacations have been targeted by a skimming attack. Research by cybersecurity company Trend Micro discovered that a series of incidents took place earlier this month in which the booking websites of two well-known...
Sep 26, 2019 | Cloud Consultancy News
MSPs are significantly more concerned with internal data breaches and rapidly evolving technology practices, whereas internal IT teams are more concerned with employee behavior/habits, according to a Central by LogMeIn report. The global survey, which polled 500 IT...
Sep 25, 2019 | Cloud Consultancy News
Cybersecurity has developed a lot recently, especially from a software perspective. From private usage to enterprise cybersecurity, the whole sector has drastically evolved and improved in the past couple of years. Although this may sound positive, it must be pointed...
Sep 24, 2019 | Cloud Consultancy News
Unlike in the pre-internet era, when trading in the stock or commodities market involved a phone call to a broker — a move which often meant additional fees for would-be traders — the rise of trading apps placed the ability to trade in the hands of ordinary users....
Sep 23, 2019 | Cloud Consultancy News
56 % of the US IoT devices and 83.8 % of the UK devices are exposing information to third-parties. The most common data shared by IoT devices to third-parties include location data and IP addresses. What was the study about? Researchers from Northeastern University...
Sep 20, 2019 | Cloud Consultancy News
Update: This issue is now resolved in “Security Intelligence Update for Windows Defender Antivirus – KB2267602 (Version 1.301.1684.0)” definitions. Microsoft has released a new update for Windows Defender that has broken both the Quick and Full...
Sep 19, 2019 | Cloud Consultancy News
Wizcase, a firm that evaluates cybersecurity products, has uncovered 15,000 potentially accessible webcams, with many of them located inside people’s homes. These webcams are vulnerable to access and manipulation by hackers. This was discovered by Avishai Efrat, a...
Sep 18, 2019 | Cloud Consultancy News
WhatsApp ‘Delete for Everyone’ feature claims to ‘unsend’ media files such as photos and video mistakenly sent to recipients. However, the feature for iOS has not been designed to delete the media files sent to iPhone users (with default settings). An application...
Sep 17, 2019 | Cloud Consultancy News
Researchers have discovered an SMS-based vulnerability that allows the tracking of mobile phone locations. Named Simjacker, this vulnerability is said to have been exploited for at least the past two years in multiple countries. The backdrop AdaptiveMobile Security...
Sep 16, 2019 | Cloud Consultancy News
The infection spread through other internal digital systems including email systems, music scheduling, production, billing, and shared network drives. This incident has forced some radio stations to complete music logs manually and run without commercials. What’s the...
Sep 13, 2019 | Cloud Consultancy News
Check Point Research has revealed a security flaw in Samsung, Huawei, LG, Sony and other Android-based phones that leaves users vulnerable to advanced phishing attacks. The affected Android phones use over-the-air (OTA) provisioning, which allows mobile network...
Sep 12, 2019 | Cloud Consultancy News
A group of attackers that has been injecting WordPress-based sites with a script redirecting visitors to malicious and fraudulent pages has now also started backdooring the vulnerable installations, Wordfence’s Mikey Veenstra warns. The attacks The attackers are...
Sep 11, 2019 | Cloud Consultancy News
It took a lot of testing and tweaking, but Mozilla’s Firefox browser is finally being delivered with Enhanced Tracking Protection and a web-based cryptomining blocking feature on by default. The changes “Enhanced Tracking Protection works behind-the-scenes to keep a...
Sep 10, 2019 | Cloud Consultancy News
43% of UK SMEs have experienced a phishing attempt through impersonation of staff in the last 12 months. Of those impersonation phishing attempts, it was discovered that two-thirds (66%) had suffered a successful attack, according to CybSafe. Businesses admitted to...
Sep 9, 2019 | Cloud Consultancy News
Microsoft began an aggressive six-month campaign in March of this year to switch the digital signature on all operating system and product updates from using Secure Hash Algorithm 1 (SHA-1) to SHA-2. This required installing the current SHA-2 algorithms in all the...
Sep 7, 2019 | Cloud Consultancy News
Microsoft is planning to improve the way you reset or refresh a Windows 10 PC. The company has revealed it’s testing a new “cloud download” feature for resetting Windows 10 when hardware fails or the OS needs reinstalling. While the feature isn’t available for public...
Sep 6, 2019 | Cloud Consultancy News
Apple makes it easy for people to locate lost iPhones, share Wi-Fi passwords, and use AirDrop to send files to other nearby devices. A recently published report demonstrates how snoops can capitalize on these features to scoop up a wealth of potentially sensitive data...
Sep 5, 2019 | Cloud Consultancy News
Microsoft yesterday announced the preview launch of Azure Dedicated Host, a new cloud service that will allow you to run your virtual machines on single-tenant physical services. That means you’re not sharing any resources on that server with anybody else and you’ll...
Sep 4, 2019 | Cloud Consultancy News
Data breaches show no signs of slowing down and companies across many industry verticals fall victim to what now seems to be a regular occurrence. Most attention around data breaches is on the commercial side, with Capital One being the recent high-profile breach,...
Sep 3, 2019 | Cloud Consultancy News
On July 15 we lost a major contributor to modern-day IT security – Dr. Fernando Corbato, the inventor of the password. Back in the early 1950s, computers could only do single processing jobs. Due to this limitation, it meant that multiple users could use the same...
Sep 2, 2019 | Cloud Consultancy News
Cybercriminals are increasingly targeting businesses with ransomware instead of consumers for a bigger payout, according to Malwarebytes. Ransomware is back with a vengeance, if you’re a business, according to Malwarebytes’s Cybercrime Tactics and...
Aug 30, 2019 | Cloud Consultancy News
There’s a mobile application for everything nowadays and platforms for arranging threesomes and hookups are no exception — but when security fails users, personal lives and careers may be at risk — a problem highlighted by a data leak discovered in...
Aug 29, 2019 | Cloud Consultancy News
Attackers accessed customers’ Oyster accounts using a list of stolen usernames and passwords obtained from other sources. TFL suspended online Oyster card accounts and has implemented additional security measures to prevent further intrusion. What is the issue?...
Aug 28, 2019 | Cloud Consultancy News
Air New Zealand suffered a data breach compromising Airpoints members’ personal information after two staffs had their accounts breached in a phishing attack. The incident has affected nearly 3.5 percent of 3.2 million Air New Zealand Airpoints customers, which is...
Aug 27, 2019 | Cloud Consultancy News
Password spraying, unlike traditional brute force attacks, often stays under the radar. Instead of targeting a single account with multiple password guesses, password spraying uses a high-probability password against multiple accounts. By avoiding rapid account...
Aug 26, 2019 | Cloud Consultancy News
Apple released new updates for iOS, watchOS, and the HomePod on 22nd July. The latest updates are stable releases for the operating systems and are available to the public instantly. The new iOS release, version 12.4, introduces a new migration feature for the iPhone....
Aug 23, 2019 | Cloud Consultancy News
Microsoft have announced that Skype for Business Online will be retired on July 31, 2021. This post provides details on the retirement plan, a brief explanation of why we’re making this announcement now, and a summary of what Microsoft are doing to help customers...
Aug 22, 2019 | Cloud Consultancy News
A new malware strain named Clipsa has been making the rounds for the past year, infecting users from all over the world. What stands out about this new threat is that besides classic malware features — such as the ability to steal cryptocurrency wallet files,...
Aug 21, 2019 | Cloud Consultancy News
Blog Author: Ed Bott The single most important security precaution you can take with high-value online accounts is to enable a mobile device as a secondary identity factor. Which authenticator app should you choose? The correct answer might involve multiple apps....
Aug 20, 2019 | Cloud Consultancy News
It is believed that the most sophisticated cyber attacks are the biggest threats to any organization. However, the biggest cybersecurity threatto a business is the people that work there. In fact, eight out of ten top data theft are as a result of human error. This...
Aug 19, 2019 | Cloud Consultancy News
Samsung announced a lot of new things last night. But more importantly, it announced an expansion of its existing partnership with Microsoft. Both the companies have been working together for a while, with Samsung shipping some of Microsoft’s apps pre-installed on its...
Aug 16, 2019 | Cloud Consultancy News
The omnipresence of consumer electronics and computer power, alongside modern trends (i.e., DevOps, microservices, and open source) that accelerate deployment cycles continue to strain enterprises’ ability to detect and identify exploitable flaws in a timely manner....
Aug 15, 2019 | Cloud Consultancy News
peaking on “Testing Your Organization’s Social Media Awareness” at Black Hat USA, Jacob Wilkin, network penetration tester and application security consultant, Trustwave SpiderLabs, said that social media phishing is on the rise and is now the “preferred vector...
Aug 14, 2019 | Cloud Consultancy News
Malwarebytes today launched a malware removal service that makes first responders in the form of cybersecurity professionals available on-demand to organisations currently under cyberattack. Kevin Latimore, enterprise malware removal specialist for Malwarebytes, said...
Aug 13, 2019 | Cloud Consultancy News
The monetary value of PHI can be enormous. As a result, attackers are employing increasingly sophisticated techniques to gain access to patient health records. Healthcare organisations are aware of the extremely sensitive nature of patient data, and consequently the...
Aug 12, 2019 | Cloud Consultancy News
Microsoft Threat Intelligence Center attributed the attacks to the STRONTIUM APT group, also known as APT28 and Fancy Bear. The compromised IoT devices include VOIP phone, office printer, and video decoder. Microsoft security researchers have observed that a...
Aug 9, 2019 | Cloud Consultancy News
In cybersecurity, deception is redundant if it cannot fulfill its critical aim – to misdirect, confuse, and lure attackers into traps and dead-ends. It is the art of tricking attackers into overextending and exposing themselves. To deceive attackers, an organization’s...
Aug 8, 2019 | Cloud Consultancy News
A majority of small and medium-sized businesses (SMBs) do not have cybersecurity protection at the top of their agenda and are highly prone to risks and vulnerabilities, according to ConnectWise. The risk assessments reveal that an alarming 69% of SMBs have not...
Aug 7, 2019 | Cloud Consultancy News
Phishing is a growing pain point for individuals, businesses and CSPs, according to Allot. Consumers are the main target of these attacks, and they are calling for better security for their data and financial information. The research shows that they are right to be...
Aug 6, 2019 | Cloud Consultancy News
70 percent of organisations are more frequently seeing insider attacks, with 60 percent experiencing one or more within the last 12 months, and 68 percent feeling “extremely to moderately” vulnerable to them, according to Nucleus Cyber. Not only are organisations...
Aug 5, 2019 | Cloud Consultancy News
A new family of ransomware designed to attack Google’s Android mobile operating system utilizes SMS messaging to spread, researchers say. On Monday, cybersecurity professionals from ESET revealed their investigation into the new malware, dubbed...
Aug 2, 2019 | Cloud Consultancy News
Apple’s Siri records private and confidential conversations and activities on a regular basis including talk relating to medical conditions, drug deals, and sex acts. The Guardian reports that an unnamed whistleblower has brought the situation to light, in which...
Aug 1, 2019 | Cloud Consultancy News
The attackers behind this campaign are demanding a ransom between 0.01 and 0.05 bitcoins. The bitcoin address associated with this campaign has received a total of 9 payments since June 27, 2019. Attackers are deleting files on publicly accessible Lenovo Iomega NAS...
Jul 31, 2019 | Cloud Consultancy News
An unauthorised third-party accessed the information for 106 million people by exploiting a configuration vulnerability. The exposed information includes personal information, credit card data, transaction data, Social Security numbers, linked bank account numbers,...
Jul 30, 2019 | Cloud Consultancy News
The victims are asked to share the message with at least 30 more people in order to claim the reward. The ultimate goal of the scammers is to perform click fraud through this type of scam. A new WhatsApp scam that claims to offer free internet data has been doing...
Jul 29, 2019 | Cloud Consultancy News
With the first large fines for breaching GDPR upon us, even anonymized datasets can be traced back to individuals using machine learning, researchers from University of Louvain and Imperial College London have shown. The researchers say their paper demonstrates that...
Jul 26, 2019 | Cloud Consultancy News
Malware attacks against mobile devices — and Android handsets in particular — have rocketed this year, with hackers increasingly turning their attention to attacking smartphones with credential-theft, surveillance, and malicious advertising. Researchers at...
Jul 25, 2019 | Cloud Consultancy News
Microsoft has plans in the works to change the way it is pricing and packaging its Dynamics 365 CRM and ERP applications. Officials shared some of the changes which will go live on October 1 with Dynamics 365 partners at last week’s Inspire partner conference....
Jul 24, 2019 | Cloud Consultancy News
This free decryptor allows LooCipher victims to decrypt their encrypted files without the need for paying the ransom. This decryptor has been created by security researcher Michael Gillespie with assistance from Francesco Muroni. Emsisoft has released a free...
Jul 23, 2019 | Cloud Consultancy News
The purpose of these campaigns is to steal the Microsoft login credentials of users. The phishing pages hosted on Azure are secured using a certificate from Microsoft in order to make it less susceptible. Phishers have been found creating campaigns that are disguised...
Jul 22, 2019 | Cloud Consultancy News
In just a few weeks Apple’s new iOS 13, the thirteenth major iteration of its popular iPhone software, will be out — along with new iPhones and a new iPad version, the aptly named iPadOS. The guys at TechCrunch have taken iOS 13 for a spin over the past few weeks —...
Jul 19, 2019 | Cloud Consultancy News
You might think that cyber attacks are a constant year round activity, or perhaps that they are focused on peak shopping periods like Christmas. But a new study from threat protection specialist Lastline reveals many security professionals believe their organisations...
Jul 18, 2019 | Cloud Consultancy News
Businesses are being attacked from all sides, and with all kinds of weapons. IT experts are being overwhelmed by the sheer scale of cyberattacks hitting businesses today, new research has claimed. A report from Sophos suggests that the attack techniques are varied and...
Jul 17, 2019 | Cloud Consultancy News
The Education and Transport industries are at the highest risk of cyber attacks due to phishing, because of weak employee training Weak employee training is the main reason industries are left vulnerable to phishing cyber attacks — this is the conclusion of...
Jul 16, 2019 | Cloud Consultancy News
Today’s business landscape is more dynamic than ever before. Organisations are being inundated with data, generated by an ever-increasing number of connected devices and systems. According to IDC, volume of data worldwide will grow ten-fold to 163ZB by 2025, and the...
Jul 15, 2019 | Cloud Consultancy News
Phishing remains a leading concern for organisations worldwide. A new Proofpoint report features analysis of data related to nearly 130 million cybersecurity questions and offers insights into employee knowledge levels across 14 categories, 16 industries, and more...
Jul 14, 2019 | Cloud Consultancy News
Businesses are increasing the pace of investment in AI systems to defend against the next generation of cyberattacks, a study from the Capgemini Research Institute has found. Two thirds (69%) of organisations acknowledge that they will not be able to respond to...
Jul 13, 2019 | Cloud Consultancy News
Some users of online team-based shooters, battle royale, or survival games commonly use game hacking or cheats to give themselves an advantage over their opponents. Unfortunately, in many cases these cheats do nothing but compromise the user’s own data as...
Jul 12, 2019 | Cloud Consultancy News
Microsoft is continuing to roll out new Windows 10 20H1 test builds with incremental new features regularly. On July 10, the company delivered Windows 10 Build 18936 to 20H1 testers in the Fast Ring. This test build adds a new “Make your device...
Jul 11, 2019 | Cloud Consultancy News
The DNS-over-HTTPS (DoH) protocol is currently the talk of the town, and the Firefox browser is the only one to support it. However, the feature is not enabled by default for Firefox users, who will have to go through many hoops and modify multiple settings before...
Jul 10, 2019 | Cloud Consultancy News
The National Health Service is still vulnerable to cyberattack, and must take action to prevent incidents that could risk the safety of patients, researchers have claimed. A report by Imperial College London’s Institute of Global Health Innovation warns that...
Jul 9, 2019 | Cloud Consultancy News
The Information Commissioner’s Office (ICO) is to fine British Airways £183.4 million over the payments system security breach last year. The fine is the first to be issued under GDPR. BA chairman and CEO Alex Cruz said that the company would appeal. “We...
Jul 8, 2019 | Cloud Consultancy News
Every executive team cares about business risk. Leaders actively trying to manage risk have realized that cyber-threats now represent the lion’s share of potential harm, and they want timely KPI metrics and insights aligned with business priorities. In fact, according...
Jul 5, 2019 | Cloud Consultancy News
There’s no doubt that the Cloud has changed the way most companies do business. It has opened up a whole new world of collaboration and productivity that now we could probably not live without. Yet Cloud adoption is continuing to raise security concerns across small-...
Jul 4, 2019 | Cloud Consultancy News
It appears that Apple is getting ready to release a new MacBook Pro, according to FCC filings. The filings, which are no longer available but were picked up by several eagle-eyed tech sites, refer to a laptop with the model number A2159, which lines up with a filing...
Jul 3, 2019 | Cloud Consultancy News
The rise in IoT devices may be leading to better connectivty and a boost in your Netflix consumption, but could also be putting your home at risk of cyberattack, new research has claimed. A report from security firm Avast and Stanford University has found that...
Jul 2, 2019 | Cloud Consultancy News
Google loves to pack hidden Easter Eggs into all of its products. Each version of Android has a different hidden game or other offerings. For example, You can play the hidden Flappy Bird game in Android 6.0 and Android Pie has a hidden trippy P logo you can launch....
Jul 1, 2019 | Cloud Consultancy News
June’s cyber security news round up features NHS Highland apologiing following reports the email addresses of almost 40 people who have HIV were made public by mistake. Elsewhere a report has suggested the healthcare cyber security market is on track to reach £21.5bn...
Jun 28, 2019 | Cloud Consultancy News
A ransomware gang has breached the infrastructure of at least three managed service providers (MSPs) and has used the remote management tools at their dispossal, namely the Webroot SecureAnywhere console, to deploy ransomware on the MSPs’ customers systems. The...
Jun 27, 2019 | Cloud Consultancy News
Effective October 1, 2019, Microsoft StaffHub will be retired. Microsoft are building StaffHub capabilities into Microsoft Teams. Today, Teams includes the Shifts app for schedule management and additional capabilities will roll out over time. These changes are part...
Jun 26, 2019 | Cloud Consultancy News
Overheating batteries are no laughing matter, so this may be urgent: Apple has just issued a recall for the 2015 MacBook Pro with Retina Display, saying its batteries “may pose a fire safety risk.” The company says there are a “limited number” of affected units, sold...
Jun 25, 2019 | Cloud Consultancy News
After years of listening to the cosmos, scientists have failed to pick up any sign of alien civilizations. So, the experts have dumped online a petabyte of signals picked up from the Breakthrough Listen project so nerds like you and me can rifle through the readings...
Jun 24, 2019 | Cloud Consultancy News
Malicious Android apps have been uncovered which are able to access one-time passwords (OTPs) in order to bypass two-factor authentication (2FA) security mechanisms. Researchers from ESET said that the apps impersonated a cryptocurrency exchange based in Turkey, known...
Jun 21, 2019 | Cloud Consultancy News
The IBM-built Pangea III supercomputer has come online for French energy giant Total, bringing 31.7 petaflops of processing power and 76 petabytes of storage capacity. It’s now the world’s most powerful supercomputer outside government-owned systems....
Jun 20, 2019 | Cloud Consultancy News
Facebook’s plans to launch its own cryptocurrency could change the game for Bitcoin, ETH, XRP, Litecoin, and other coins, in a positive and a negative way. On the positive side, Facebook’s movement could change investor sentiment, as is already evident by the upward...
Jun 19, 2019 | Cloud Consultancy News
Cybersecurity researchers have released an updated version of GandCrab ransomware decryption tool that could allow millions of affected users to unlock their encrypted files for free without paying a ransom to the cybercriminals. GandCrab is one of the most prolific...
Jun 18, 2019 | Cloud Consultancy News
Mozilla could be rethinking the way it offers some features on Firefox. The company is rethinking its business to generate more revenue and introduce new sources of revenue for the business, and one of them could involve offering a subscription service on Firefox....
Jun 17, 2019 | Cloud Consultancy News
Phishing remains one of the most useful tools in a cybercriminal’s arsenal as new research from Valimail has revealed that at least 3.4bn fake emails are sent out worldwide each day. The firm’s latest quarterly report, Email Fraud Landscape for...
Jun 14, 2019 | Cloud Consultancy News
The Nova Scotia Health Authority (NSHA) is in the process of notifying nearly 3,000 people about a potential privacy breach involving personal health information, the organization announced on Monday. The health authority says the breach was detected by its IT...
Jun 13, 2019 | Cloud Consultancy News
Apple and Microsoft are making it easy for customers to access and enjoy the benefits of their iCloud account across their Windows 10 PC and Apple devices with the all-new iCloud for Windows app available today from the Microsoft Store. You can easily access your...
Jun 12, 2019 | Cloud Consultancy News
Microsoft hasn’t quite killed off the password and probably never will. But it’s claiming that the just-released Windows 10 version 1903 or the May 2019 Update makes significant inroads to creating a ‘passwordless’ experience for users....
Jun 11, 2019 | Cloud Consultancy News
Microsoft’s security researchers have issued a warning on Friday afternoon about an ongoing spam wave that is spreading emails carrying malicious RTF documents that infect users with malware without user interaction, once users open the RTF documents. Microsoft...
Jun 11, 2019 | Cloud Consultancy News
The new leak has exposed the source code of a hacking tool named ‘Jason’ which is completely new and has not been spotted in any previous attacks. Lab Dookhtegan has previously leaked six hacking tools belonging to Iranian state hackers on the same Telegram channel. A...
Jun 10, 2019 | Cloud Consultancy News
Password manager maker Dashlane has raised $110 million in its latest round of funding, the company said Thursday. The company said Sequoia Capital led the Series D round, with partner Jim Goetz joining the board. Dashlane also said Lyft executive Joy Howard was...
Jun 7, 2019 | Cloud Consultancy News
You may find it surprising that small businesses make up more than 97% of total businesses in North America, according to the Better Business Bureau (BBB). Given this statistic, I suppose the good news is that fewer than half of all cyberattacks target small...
Jun 6, 2019 | Cloud Consultancy News
Any type of security breach can have an impact and far-reaching repercussions for a company and its customers. Infrastructure security is a top priority for all IT managers. Organisations must be proactive in locating network vulnerabilities and resolving them, in...
Jun 5, 2019 | Cloud Consultancy News
Apple has finally launched a new, high-end Mac Pro with an up to 28-core processor and support for up to 1.5TB of RAM – and a price tag starting at $5999. The all-new device was launched by Apple CEO Tim Cook and head of hardware John Ternus at the...
Jun 4, 2019 | Cloud Consultancy News
Apple, Google, Microsoft, and WhatsApp have opposed a proposal by UK spy agency GCHQ to give spies access to end-to-end encrypted communications. Rather than add a backdoor or undermine encryption itself, technical whizzes from GCHQ and its cybersecurity unit, the...
Jun 3, 2019 | Cloud Consultancy News
There has been a major decline in ransomware and malware attacks, with Ireland having some of the lowest rates globally, according to the latest report released by Microsoft. This is a significant change from 2017, following a prolific series of attacks that targeted...
May 31, 2019 | Cloud Consultancy News
Airbnb users may want to check their accounts even if they aren’t planning a trip anytime soon – some fellow customers on the rental site have been scammed with reservations they didn’t make. Account holders have been charged for non-refundable...
May 30, 2019 | Cloud Consultancy News
Cyber security has risen as a key issue on the radar of virtually all organisations. As a recent AT Kearney report suggests, cyber-attacks have been topping executives’ lists of business risks for three straight years. In fact, the overwhelming majority of...
May 29, 2019 | Cloud Consultancy News
Networks need regular cleaning just like your home, car or garage. Why? The answer is simple – poor security hygiene can lead to major data breaches. If you don’t regularly review your network, potential weaknesses and vulnerabilities will stack up. As we enter into...
May 28, 2019 | Cloud Consultancy News
Employees are aware of the risks associated with inadequate USB drive security – yet their employers aren’t mandating following best practices, according to a report by Apricorn. “The State of USB Data Protection 2019: Employee Spotlight” survey report, which polled...
May 27, 2019 | Cloud Consultancy News
Improving configuration management in Software-as-a-Service (SaaS) applications can minimize the risk of data loss, phishing campaigns and prevent breaches. How can the IT team put up guardrails for users? Defaults Make Life Easy–for Hackers Widely-used cloud...
May 24, 2019 | Cloud Consultancy News
General Data Protection Regulation, or GDPR, is here. Here’s what it means, how it impacts individuals and businesses – and how to ensure compliance. What does GDPR stand for? GDPR stands for General Data Protection Regulation. It’s the core of...
May 23, 2019 | Cloud Consultancy News
Apple updated MacBook Pro with faster 8th- and 9th-generation Intel Core processors, bringing eight cores to MacBook Pro for the first time. MacBook Pro now delivers two times faster performance than a quad-core MacBook Pro and 40 percent more performance than a...
May 22, 2019 | Cloud Consultancy News
Technology is both boon and curse for the world. While businesses across the globe are taking stringent methods to ensure safety of financial credentials and identity, the cyber criminals are posing new challenges. It is quite true, technology advancement has...
May 21, 2019 | Cloud Consultancy News
IT leaders in the United States are putting business data at risk by not effectively managing employees’ passwords, according to OneLogin research. Despite the fact that 91% report they have company guidelines in place around password complexity, and 92% believe their...
May 20, 2019 | Cloud Consultancy News
Google has added a control option to users’ accounts that will allow them to instruct the company to auto-delete their location history, browsing and search data once a certain length of time has passed. “Choose a time limit for how long you want your activity data to...
May 17, 2019 | Cloud Consultancy News
Microsoft has announced new privacy controls for Microsoft 365 enterprise customers: they will be able to revoke access to encrypted emails, block sensitive information from being shared or leaked when using Teams, use new data investigation capabilities and improve...
May 16, 2019 | Cloud Consultancy News
Orange has agreed to acquire SecureLink to tap into the growing enterprise cybersecurity market in Europe. The deal was agreed for €515 million ($577m), the telecommunications giant said on Tuesday 7th May. Founded in 2003, Netherlands-based SecureLink, previously...
May 15, 2019 | Cloud Consultancy News
The leaky database also kept a track of users who clicked on messages through Grand Slam Marketing, another small advertising company. The data exposed in the incident includes MD5-hashed emails, IP addresses, Phone numbers, and ZIP codes. ApexSMS Inc., an SMS text...
May 14, 2019 | Cloud Consultancy News
Phishers are continually coming up with new tricks to get users to click on malicious links and share sensitive login information. Enterprise phishing attacks predominantly take the form of simple credential phishing emails, i.e., attempts to trick an employee into...
May 13, 2019 | Cloud Consultancy News
Unsurprisingly, 78% of micro and small businesses, and 92% of medium-sized businesses, now say that cyber security is a high priority. With this in mind, here are five things that SMEs can do to make their cyber security better without spending a penny. Remember...
May 10, 2019 | Cloud Consultancy News
New tools, such as Compliance Manager and Advanced Message Encryption, aim to give businesses more options for data privacy. Microsoft is rolling out a series of new capabilities designed to give businesses greater control over their data privacy practices, help meet...
May 9, 2019 | Cloud Consultancy News
Advice for organisations on implementing multi-factor authentication (or two-factor authentication) to protect against password guessing and theft on online services. This guidance describes how to use multi-factor authentication (MFA) to mitigate against password...
May 8, 2019 | Cloud Consultancy News
How setting up 2FA can help protect your online accounts, even if your password is stolen. Introduction This guidance explains how you can set up two-factor authentication (2FA) on your important online accounts. Doing this makes it harder for criminals to access your...
May 7, 2019 | Cloud Consultancy News
Guidance for organisations deploying a range of end user device platforms as part of a remote working solution Introduction Modern smartphones, laptops and tablets provide users with great flexibility and functionality, and include security technologies to help...
May 6, 2019 | Cloud Consultancy News
Image Credit: Shutterstock New research from Hiscox has revealed that the proportion of UK firms reporting cyberattacks has jumped despite most businesses admitting they are under-prepared for breaches. The insurer surveyed over 5,400 small, medium and large...
May 3, 2019 | Cloud Consultancy News
Google has launched Chrome 74 for Windows, Mac, Linux, Android and iOS, bringing with it a bunch of handy new features, although some – such as Incognito detection blocking – require a bit of tinkering to access. Straight out of the box, though, is motion...
May 2, 2019 | Cloud Consultancy News
Overview Emotet is an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware affecting state, local, tribal, and territorial (SLTT)...
May 1, 2019 | Cloud Consultancy News
As our reliance on technology grows, so does our need for improved cybersecurity. With so much of our personal information stored in our devices, simply browsing online or enabling certain settings on your smartphone may be leaving you vulnerable to hackers. Of...
Apr 30, 2019 | Cloud Consultancy News
– The new scam operates in a similar manner as the recent ‘The Nasty List’ scam. – The scam begins with Instagram users receiving a message regarding a list of their ‘hot’ photos on Instagram. A new phishing scam called ‘The Hotlist’ has been found...
Apr 29, 2019 | Cloud Consultancy News
Security is only as strong as its weakest link, and as we have seen, that includes your employees. Faulting workers for behavior they’ve become accustomed to in their private lives is tricky. It can reinforce ITs added challenge of protecting company assets by having...
Apr 26, 2019 | Cloud Consultancy News
Your company may have state-of-the-art monitoring and the latest anti-malware and anti-virus programs, but that doesn’t mean you’re not at risk for a breach, or that – as an employee, that you’re not putting your company at risk. Humans have always been the weakest...
Apr 25, 2019 | Cloud Consultancy News
Malicious actors are targeting critical infrastructure (CNI) sites and energy distribution facilities exponentially. Interconnected systems in the energy industry increase vulnerabilities, and cyber attacks often go undetected for some time. As energy companies save...
Apr 24, 2019 | Cloud Consultancy News
Endpoint security tools and agents fail, reliably and predictably, according to the 2019 Global Endpoint Security Trends Report from Absolute. From there, every additional security tool only amplifies complexity and increases the probability of failure and decay, in...
Apr 23, 2019 | Cloud Consultancy News
The French government has developed its own end-to-end encrypted instant messenger (IM) app to replace government employee use of Telegram, WhatsApp, and other third-party IM clients. The app, named Tchap, was launched on April 18, and is available on the official iOS...
Apr 18, 2019 | Cloud Consultancy News
Google’s Chrome browser will get a Reader Mode, similar to the one found in competing browsers like Firefox and the old Microsoft Edge. The feature is currently under development, but Chrome Canary users can test it starting today. Chrome’s Reader Mode...
Apr 17, 2019 | Cloud Consultancy News
The National Cyber Security Centre (NCSC), a part of GCHQ, together with Wayra UK, has launched a national call for start-ups to join its accelerator programme to develop next generation cyber security solutions. Since its launch in 2017, the ‘NCSC Cyber Accelerator’,...
Apr 16, 2019 | Cloud Consultancy News
– Land Lordz, a software-as-a-service platform, helps automate the creation and management of fake Airbnb sites. – It can also send messages to users, advertising the fraudulent listings. Scammers are recently using a powerful new tool named ‘Land Lordz’...
Apr 15, 2019 | Cloud Consultancy News
– Cybercriminals are heavily relying on such type of frauds to steal money from users, especially in Brazil and Mozambique. – Tricksters are using social engineering and simple phishing attack to take control of a victim’s phone. SIM swap fraud is a type...
Apr 12, 2019 | Cloud Consultancy News
While viruses and malware have stubbornly stayed as a top-10 “things I lose sleep over as a CISO,” the overall threat has been steadily declining for a decade. Unfortunately, WannaCry, NotPetya, and an entourage of related self-propagating ransomware abruptly...
Apr 11, 2019 | Cloud Consultancy News
Microsoft has modified the way Windows 10 handles the operation of disconnecting a USB or Thunderbolt storage device. This includes USB thumb drives, external hard drives, flash drives, and even USB data transfer connections established between PCs and smartphones....
Apr 10, 2019 | Cloud Consultancy News
A snapshot of the Locked Shields 2018 overhead dashboard shows if exercise participants are successful in fending off hacker attacks against critical infrastructure. (NATO Cooperative Cyber Defence Centre of Excellence photo) COLOGNE, Germany – NATO’s cybersecurity...
Apr 9, 2019 | Cloud Consultancy News
GCHQ’s Dr Ian Levy: Huawei is ‘engineering like it’s back in the year 2000′ Huawei is facing a ban from the core of 5G networks in the UK over official claims that the security of its communications products is ‘very shoddy’. The claims...
Apr 8, 2019 | Cloud Consultancy News
– The core reason for the compromise of WordPress and Joomla sites could be unpatched vulnerabilities and outdated plugins, themes, or extensions. – Attackers are leveraging a well-known hidden directory present on the HTTPS site for storing and...
Apr 6, 2019 | Cloud Consultancy News
The cyber security market in India is growing exponentially, and is expected to employ over a million professionals by 2025. With 15% of enterprises having experienced a targeted attack and more than 53% losing sensitive data as a result, India’s need for cyber...
Apr 5, 2019 | Cloud Consultancy News
– An internal inspection revealed that the incident is an ‘accident involving insiders’. – Upon detecting the abnormal transaction, Bithumb blocked any deposit or withdrawal requests and secured all cryptocurrency with a cold wallet. What is the issue...
Apr 4, 2019 | Cloud Consultancy News
– The first and foremost step in the Man-in-the-Middle (MitM) attack is to intercept internet traffic before it reaches its destination. – Once the interception is achieved, the SSL traffic has to be decrypted without the user’s knowledge and without...
Apr 3, 2019 | Cloud Consultancy News
If you’ve got a Paypal account, keep your eyes peeled for the latest scam attempt to steal your personal details. The Australian Cyber Security Centre (ACSC) is warning Aussies about malicious emails from scammers pretending to be from Paypal. The scam email informs...
Apr 2, 2019 | Cloud Consultancy News
Cybersecurity demands of SMBs have become both a major risk and revenue opportunity to managed service providers (MSPs). MSPs are at risk of losing their SMB clients if they don’t provide competitive, comprehensive solutions to their clients, according to Vanson...
Apr 1, 2019 | Cloud Consultancy News
Employees currently think of stealing data, or taking corporate data with them, as a similar offence to taking paper clips home – technology, education and reassurance are required to stop this. When people outside of the IT industry hear the phrase ‘data breach’ or a...
Mar 29, 2019 | Cloud Consultancy News
Malware protection designed to prevent another WannaCry highlighted security flaw in Huawei MateBook device manager, claims Microsoft Security researchers at Microsoft have unearthed what they claim is a security flaw in Huawei’s device manager driver for its...
Mar 28, 2019 | Cloud Consultancy News
MADRID (Reuters) – A computer virus infected the Spanish Defence Ministry’s intranet this month with the aim of stealing high tech military secrets, El País newspaper said on Tuesday, citing sources leading the investigation as suspecting a foreign power behind...
Mar 27, 2019 | Cloud Consultancy News
The internet is about to change forever. The European Parliament has backed controversial changes to copyright laws that critics argue could fundamentally change how the internet works. The Copyright Directive, which was backed by 348 MEPs with 274 against, is the...
Mar 26, 2019 | Cloud Consultancy News
The Taiwan-based tech giant ASUS is believed to have pushed the malware to hundreds of thousands of customers through its trusted automatic software update tool after attackers compromised the company’s server and used it to push the malware to machines. Researchers...
Mar 25, 2019 | Cloud Consultancy News
Microsoft seems to think less of Macs’ built-in security than Apple does, because it’s porting Windows Defender ATP to macOS Many people think Macs are completely secure and don’t need security software. The jury is out on that one but it looks like...
Mar 22, 2019 | Cloud Consultancy News
Microsoft has unveiled a number of software upgrades that it says can help boost productivity, efficiency and security in businesses of all sizes. The software giant spoke to TechRadar Pro about some exciting updates and new releases for its Microsoft 365 platform,...
Mar 21, 2019 | Cloud Consultancy News
Regardless of their size, organisations share a common challenge: IT security teams are understaffed and overextended. The number of security alerts, the challenge of what to prioritise and the shortage of expertise can be overwhelming and introduce risk. The Trend...
Mar 20, 2019 | Cloud Consultancy News
Apple has updated its iMac line with up to 8-core Intel 9th-generation processors for the first time and powerful Vega graphics options, delivering dramatic increases in both compute and graphics performance. From consumers to pros alike, users will notice their iMac...
Mar 19, 2019 | Cloud Consultancy News
Through an on-going drive to excellence, The Cloud Consultancy have now achieved Microsoft Silver Small & Midmarket Cloud Solutions status, asserting its position as a professional ‘Managed Services Provider Of Choice’. The Microsoft Silver Small & Midmarket...
Mar 18, 2019 | Cloud Consultancy News
GandCrab’s evolution underscores a shift in ransomware attack methods. Don’t be fooled by the drop in overall ransomware attacks this past year: Fewer but more targeted and lucrative campaigns against larger organizations are the new MO for holding data...
Mar 15, 2019 | Cloud Consultancy News
Almost half of all organisations have fallen victim to phishing attacks in the last two years, with larger businesses the most likely to been compromised, despite also being most likely to conduct cyber security training for staff. Research by security company Sophos...
Mar 14, 2019 | Cloud Consultancy News
Phishing This is a growing problem and if you’re curious what spear phishing is or if you haven’t heard about it, spear phishing is the fraudulent practice of sending emails or other messages. It could be a text message as an example, that appeared to be from a known...
Mar 13, 2019 | Cloud Consultancy News
Apple will finally – after many years of preparation – unveil its streaming video rival to Netflix in a “special event” at the company’s Steve Jobs Theater on Monday 25 March. The invitations, sent out yesterday, feature the tagline...
Mar 12, 2019 | Cloud Consultancy News
Officials in the USA (Jackson County, Georgia) paid $400,000 to cyber-criminals this week to get rid of a ransomware infection and regain access to their IT systems. The ransomware hit the county’s internal network last week, on Friday, 1st March. The infection...
Mar 11, 2019 | Cloud Consultancy News
WebAuthn is a new way of logging into websites that may finally free you from remembering passwords. Instead, you’ll use you: your fingerprint or face, or a hardware token. The WebAuthn API is now an official standard, ratified by the World Wide Web Consortium (or...
Mar 8, 2019 | Cloud Consultancy News
Google Chrome’s security lead and engineering director, Justin Schuh, has warned that users of the most popular web browser should update “like right this minute.” Why the urgency? Simply put, there is a zero-day vulnerability for Chrome that the...
Mar 7, 2019 | Cloud Consultancy News
Be careful when you click. That email might not be as innocent as it looks. The number of phishing attacks is on the rise, more than doubling in recent months, with one in 61 emails delivered to corporate inboxes found to contain a malicious URL. Analysis by security...
Mar 6, 2019 | Cloud Consultancy News
Changes in user behaviour are increasingly blurring the lines between personal and business. Trends like Bring Your Own Device (BYOD) and flexible working often mean that people are using work devices outside of the office. In fact, recent research has shown that half...
Mar 5, 2019 | Cloud Consultancy News
Victims of the GandCrab ransomware can recover their files without giving into the demands of the criminals thanks to a new decryption tool released for free on www.nomoreransom.org. This data recovery kit was developed by the Romanian Police in collaboration with its...
Mar 4, 2019 | Cloud Consultancy News
If your PC were lost or stolen, you’d probably cringe at the cost of replacing it. But that’s nothing compared to what you’d stand to lose if someone had unfettered access to the data on that device. Even if they can’t sign in using your...
Mar 1, 2019 | Cloud Consultancy News
Social media platforms are a major conduit for malware and a highly effective marketplace for black hat resources, generating cybercrime worth over $3.2bn every year, according to Bromium. The security vendor’s latest report, Social Media Platforms and the Cybercrime...
Feb 28, 2019 | Cloud Consultancy News
Increased security measures and awareness are driving cybercriminals to alter their techniques in search of a better return on investment (ROI). As a result, two major shifts occured, including decreased reliance on malware and a decline in ransomware, as criminals...
Feb 27, 2019 | Cloud Consultancy News
A series of malware campaigns that push the More_eggs backdoor via fake jobs offers are targeting employees of US companies which use shopping portals and similar online payment systems. The final payload used in this phishing campaign is always the JavaScript-based...
Feb 26, 2019 | Cloud Consultancy News
Researchers recently observed a spear phishing campaign containing a new malware dubbed ‘BabyShark’. – Researchers noted that the spear phishing campaign targets national security think tanks and research institutions in the US. – Researchers from Palo...
Feb 25, 2019 | Cloud Consultancy News
Duo Security has released CRXcavator, a tool that can help end users and enterprises make an informed decision about installing a specific Chrome extension. About CRXcavator CRXcavator was created as an internal tool by Duo’s Corporate Security Engineering team and,...
Feb 22, 2019 | Cloud Consultancy News
The Russian government is planning to cut the country off from the global internet as part of a test to ensure that it has total control of ‘Runet’ – the Russian internet area. The plan is part of the Russian government’s Digital Economy National...
Feb 21, 2019 | Cloud Consultancy News
EU member states are reportedly mulling a joint response to cyber-attacks allegedly carried out by China-linked hacking group Advanced Persistent Threat 10 (APT 10), Bloomberg has reported. Insiders told Bloomberg that a team of British experts last month provided...
Feb 20, 2019 | Cloud Consultancy News
Despite having been ‘in the wild’ for some weeks now, infections caused by STOP ransomware have continued to rise. Perhaps somewhat ironically, those most affected (at the moment) appear to be software pirates. Security analysts have discovered the STOP executable is...
Feb 19, 2019 | Cloud Consultancy News
A targeted phishing campaign is underway that states your email has been blacklisted and then asks you to confirm it by entering your credentials. For some reason, this campaign is using phishing links that can contain almost 1,000 characters, which is enough to make...
Feb 18, 2019 | Cloud Consultancy News
Amazon and Google have been accused of making a grab for data generated by smart home Internet of Things devices – even from devices that have not been produced by the two internet giants. The companies already collect details of every action controlled via...
Feb 16, 2019 | Cloud Consultancy News
Online dating profiles and social media accounts add to the rich data sources that allow criminals to tailor attacks. US-CERT and Cupid don’t often keep company, but this Valentine’s Day is being marked by new threats to those seeking romance and new...
Feb 15, 2019 | Cloud Consultancy News
Senators in the US have urged the US Department of Homeland Security (DHS) to investigate VPN apps amid claims that data is not as private as users might believe. In a letter to Christopher Krebs, the director of the DHS’s Cybersecurity and Infrastructure...
Feb 14, 2019 | Cloud Consultancy News
Unknown intruders have breached servers of US-based email provider VFEmail.net and destroyed all the data of its US customers in what the company has described as a “catastrophic destruction”. According to VFEmail, hackers did not demand a ransom, nor...
Feb 13, 2019 | Cloud Consultancy News
We’ve all had those moments: You’re about to video call your parents and your laundry is all over the place, or you’re about to have a meeting with a potential investor and your business plan is on a whiteboard behind you, or you’re being interviewed on live...
Feb 12, 2019 | Cloud Consultancy News
– Some 1500 to 2000 systems belonging to the MSP’s client were affected in the attack. – The MSP itself is facing a ransom demand or $2.6 million. A US-based mid-sized Managed Service Provider (MSP) with about 80 clients and unknown endpoints got hacked....
Feb 11, 2019 | Cloud Consultancy News
– Attackers are using a new technique that uses Google Translate to hide the real domain of their phishing sites. – This phishing technique works more effectively in mobile devices when compared to desktops. Researchers uncovered that attackers are using a...
Feb 8, 2019 | Cloud Consultancy News
A German security researcher has published a video over the weekend showing a new zero-day affecting Apple’s macOS desktop operating system. In an interview to German tech site Heise, Linus Henze, the security researcher, says the vulnerability allows a...
Feb 7, 2019 | Cloud Consultancy News
– These flaws in the Remote Desktop Protocol (RDP) can result in the so-called ‘reverse RDP attack’ – There are a total of 25 security issues in the RDP Security researchers have discovered multiple vulnerabilities in the Remote Desktop Protocol (RDP) that...
Feb 6, 2019 | Cloud Consultancy News
A widespread phishing campaign is targeting executives across a number of industries with messages asking to reschedule a board meeting in an effort to steal logins and passwords. Spotted by researchers at security firm GreatHorn, the phishing messages spoof the name...
Feb 5, 2019 | Cloud Consultancy News
Executives at financial services companies are increasingly concerned about risks, but as technology becomes more integrated in managing financials, more executives say that cybersecurity is increasingly becoming the most important type of risk, according to a new...
Feb 4, 2019 | Cloud Consultancy News
A new piece of Mac malware is looking to steal both the targets’ computing power and their cryptocurrency stash, Palo Alto Networks researchers warn. Dubbed CookieMiner on account of its cookie-stealing capabilities, this newly discovered malware is believed to be...
Feb 2, 2019 | Cloud Consultancy News
New research from Avast has revealed that more than half (55 percent) of PC applications installed worldwide are out-of-date, leaving users and their personal data vulnerable to security risks. The firm’s PC Trends Report 2019 found that users are making...
Feb 1, 2019 | Cloud Consultancy News
The firm Proofpoint analysed data from tens of millions of simulated phishing attacks sent over a one-year period, along with nearly 15,000 cybersecurity professional survey responses, to provide an in-depth look at state of global phishing attacks. Overall, 83...
Jan 31, 2019 | Cloud Consultancy News
The current DNS is unnecessarily slow and inefficient because of efforts to accommodate a few DNS systems that are not in compliance with DNS standards established two decades ago. To ensure further sustainability of the system it is time to end these accommodations...
Jan 31, 2019 | Cloud Consultancy News
The 5G band is the next generation of broadband connection being rolled out by wireless mobile carriers globally. It will replace the existing standard, 4G LTE. While carriers upgrade existing network equipment to 5G, it will live alongside your 4G mobile wireless...
Jan 30, 2019 | Cloud Consultancy News
Identifying phishing can be harder than you think. Alphabet subsidiary Jigsaw has made a quiz with Google to test your phishing awareness skills. To make this quiz, the team drew from materials they’ve used to train thousands of journalists, political figures...
Jan 29, 2019 | Cloud Consultancy News
Japan will attempt to access Internet-connected devices in homes and offices to find their vulnerabilities. The first-of-its-kind survey is aimed at beefing up cyber-security. The government approved the survey on Friday. It will be carried out by the National...
Jan 28, 2019 | Cloud Consultancy News
As Apple revealed at WWDC last year, the Microsoft’s Office 365 suite is finally available on the Mac App Store. This includes the entire collection of apps (including Word, Excel, Powerpoint, Outlook, OneNote, OneDrive etc.) all purchasable within a few clicks...
Jan 28, 2019 | Cloud Consultancy News
A cloud access security broker (CASB) is a software tool or service that sits between an organisation’s on-premises infrastructure and a cloud provider’s infrastructure. A CASB acts as a gatekeeper, allowing the organisation to extend the reach of their...
Jan 25, 2019 | Cloud Consultancy News
One malicious tactic that has become quite prevalent in recent years is known as a ‘man in the cloud’ (MitC) attack. This attack aims to access victims’ accounts without the need to obtain compromised user credentials beforehand. Below, this article explains the...
Jan 24, 2019 | Cloud Consultancy News
– The attackers have been observed launching two variants of GandCrab, a variant of BetaBot and a variant of AZORult infostealer malware. – AZORUlt sample act as a secondary payload in the attack process. The prolific GandCrab ransomware is back with a set...
Jan 23, 2019 | Cloud Consultancy News
Microsoft’s Cortana digital assistant has fallen behind Google Assistant and Alexa over the past year, and now the software maker is taking a different approach to the competition. Speaking to journalists at a media event last week the CEO, Satya Nadella, revealed...
Jan 22, 2019 | Cloud Consultancy News
– WPML Plugin was reportedly hacked by a former employee, who also sent out spam emails to its users regarding the site’s security. – WPML allows multilingual websites to work smoothly under WordPress. WPML, a plugin supporting multilingual websites in...
Jan 21, 2019 | Cloud Consultancy News
Sword GRC canvassed amost 150 risk managers from highly risk-aware organisations worldwide for their opinions. Overall, cybersecurity was seen as the biggest risk to business by a quarter of organisations. In the UK, Brexit and the resulting potential economic...
Jan 18, 2019 | Cloud Consultancy News
Search engine DuckDuckGo announced today that it has licensed Apple Maps for its map- and address-related search results on both mobile and desktop. “We’re excited to work closely with Apple to set a new standard of trust online, and we hope you’ll enjoy this update,”...
Jan 17, 2019 | Cloud Consultancy News
Walgreens Boots Alliance, which owns the Boots the Chemist pharmacy chain in the UK, has announced a partnership with Microsoft that will involve the roll-out of Microsoft 365 to 380,000 of its 415,000 staff worldwide. However, in addition to that, the company is also...
Jan 16, 2019 | Cloud Consultancy News
– A zero-day vulnerability detected in Microsoft Windows can put the user’s system at peril. – Cybercriminals can use vCards to execute malicious code, which once clicked, can allow them control over the affected system. vCards, which are known for sharing...
Jan 15, 2019 | Cloud Consultancy News
A new penetration testing tool published at the start of the year by a security researcher can automate phishing attacks with an ease never seen before and can even blow through login operations for accounts protected by two-factor authentication (2FA). Named...
Jan 14, 2019 | Cloud Consultancy News
Even though the new year just started, it’s already the second Tuesday of the month which means it’s Microsoft’s regular Patch Tuesday. Today the company is releasing cumulative updates for all currently supported versions of Windows 10 and Server. There are no...
Jan 11, 2019 | Cloud Consultancy News
Many security-minded businesses use multi-factor authentication to verify customers’ identities. The most familiar method is to send customers a code by SMS text message, which the customer then enters on the website or app. But what if you are travelling and don’t...
Jan 10, 2019 | Cloud Consultancy News
Four months after the attack by a mysterious hacker group on Mac users, few of its MacOS malware samples went undetected by most of the antivirus providers. One of these Mac malware variants is believed to have been linked to Windshift the APT group that surveils...
Jan 9, 2019 | Cloud Consultancy News
IBM has used CES 2019 to launch what it claims is the world’s first commercial quantum computing system, developed with UK design studios Map Project Office and Universal Design Studio. The 20-qubit Q System One sits in a glass-enclosed, air-tight environment...
Jan 8, 2019 | Cloud Consultancy News
Starting February 1, Microsoft are adding two new Microsoft 365 subscription bundles to its price list. These packages are aimed at business customers who might not be ready to subscribe to the highest-end Microsoft 365 E5 bundle, but who are interested in some of its...
Jan 7, 2019 | Cloud Consultancy News
As beneficial as remote working is, it comes with a few problems of its own. One, and a major one at that, is security. According to new figures from CybSafe, every third business has suffered a data breach thanks to its remote workforce, all in the past 12 months....