Cloud Consultancy News
D-Link Adds More Buggy Router Models to ‘Won’t Fix’ List
The list of routers that have critical RCE bugs, that have reached end of life and that won’t get fixed has grown. D-Link has warned that more of its routers are vulnerable to critical flaws that allow remote hackers to take control of hardware and steal data. The...
Macys.com Magecart Attack Yields Payment, Personal Info
Hackers accessed macys.com’s “Checkout” and “My Wallet” pages early last month and added malicious script to lift shoppers’ personal information, such as credit card data, then send it to a remote site. The company discovered the Oct. 7 hack on Oct. 15 when it...
Attackers Using WhatsApp MP4 Video Files Vulnerability Can Remotely Execute Code
Facebook has disclosed the existence of a severe vulnerability leading to remote code execution attacks in WhatsApp messaging software. Last week, the technology giant said in a security advisory that the WhatsApp bug, tracked as CVE-2019-11931, is a stack-based...
Amazon Ring Doorbells Exposed Home Wi-Fi Password To Hackers
Security researchers have discovered a vulnerability in Ring doorbells that exposed the passwords for the Wi-Fi networks to which they were connected. Bitdefender said the Amazon-owned doorbell was sending owners’ Wi-Fi passwords in cleartext as the doorbell joins...
DNS-over-HTTPS will eventually roll out in all major browsers, despite ISP opposition
All six major browser vendors have plans to support DNS-over-HTTPS (or DoH), a protocol that encrypts DNS traffic and helps improve a user's privacy on the web. The DoH protocol has been one of the year's hot topics. It's a protocol that, when deployed inside a...
Equifax Lawsuit: ‘Admin’ As Password At Time Of 2017 Breach
The Equifax breach took place in 2017, but even two years later it is still regarded as one of the worst of all time. The Equifax breach happened because the firm failed to patch a web server, which is itself a very basic error. But now a class action lawsuit shows...
Cyber risks are the top concern among businesses of all sizes
Cyber risks are the top concern among businesses of all sizes for the first time since the Travelers Companies’ survey began in 2014. Of the 1,200 business leaders who participated in the survey, 55% said they worry some or a great deal about cyber risks, ahead of...
Impact and prevalence of cyberattacks that use stolen hashed administrator credentials
There’s a significant prevalence and impact of cyberattacks that use stolen hashed administrator credentials, also referred to as Pass the Hash (PtH) attacks, within businesses today, according to a survey from One Identity. Among the survey’s most noteworthy findings...
Does poor password hygiene still hamper your ability to achieve high security standards?
While more businesses are investing in security measures like multifactor authentication (MFA), employees still have poor password habits that weaken companies’ overall security posture, according to LastPass. Given that stolen and reused credentials are linked to 80...
Cybercrime is maturing, shifting its focus to larger and more profitable targets
Cybercrime is continuing to mature and becoming more and more bold, shifting its focus to larger and more profitable targets as well as new technologies. Data is the key element in cybercrime, both from a crime and an investigate perspective. These key threats...