Cloud Consultancy News
Most mid-sized businesses lack cybersecurity experts, incident response plans
99% of all businesses across the United States and Canada are mid-sized businesses facing cybersecurity challenges, according to a Huntress report. Aimed to gain insights into organizational structure, resources and cybersecurity strategies, the results contextualize...
Hackers Exploiting WordPress Elementor Pro Vulnerability: Millions of Sites at Risk!
Unknown threat actors are actively exploiting a recently patched security vulnerability in the Elementor Pro website builder plugin for WordPress. The flaw, described as a case of broken access control, impacts versions 3.11.6 and earlier. It was addressed by the...
3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component
Business communication solutions provider 3CX has confirmed that it’s investigating a security breach, as the cybersecurity community is sharing more information on what appears to be a sophisticated supply chain attack. The attack seems to impact 3CXDesktopApp, an...
Apple Music Classical is now available with a few curious caveats
After several weeks as a preorder, Apple Music Classical is for Apple Music subscribers. Users can download it in the App Store as a standalone app dedicated to “the complex data structure of classical music.” The interface is similar to the main Apple Music app,...
Apple Issues Urgent Security Update for Older iOS and iPadOS Models
Apple on Monday backported fixes for an actively exploited security flaw to older iPhone and iPad models. The issue, tracked as CVE-2023-23529, concerns a type confusion bug in the WebKit browser engine that could lead to arbitrary code execution. It was originally...
New MacStealer macOS Malware Steals iCloud Keychain Data and Passwords
A new information-stealing malware has set its sights on Apple's macOS operating system to siphon sensitive information from compromised devices. Dubbed MacStealer, it's the latest example of a threat that uses Telegram as a command-and-control (C2) platform to...
Critical WooCommerce Payments Plugin Flaw Patched for 500,000+ WordPress Sites
Patches have been released for a critical security flaw impacting the WooCommerce Payments plugin for WordPress, which is installed on over 500,000 websites. The flaw, if left unresolved, could enable a bad actor to gain unauthorized admin access to impacted stores,...
Fortune 500 Company Names Found in Compromised Password Data
New research released by Specops Software outlines the most common Fortune 500 company names that show up in compromised password data. The Specops research team analysed an 800 million password subset of the larger Breached Password Protection database to obtain...
Ferrari Says Ransomware Attack Exposed Customer Data
Italian sports car maker Ferrari have said that a threat actor had demanded a ransom related to customer contact details that may have been exposed in a ransomware attack. “Upon receipt of the ransom demand, we immediately started an investigation in collaboration...
Threat actors are experimenting with QR codes
Hackers are diversifying attack methods, including a surge in QR code phishing campaigns, according to HP. From February 2022, Microsoft began blocking macros in Office files by default, making it harder for attackers to run malicious code. Data collected by the HP...