Default passwords are main threat to businesses
The digital entrance to businesses is still too often open due to default passwords. This culprit is identified by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA).
Too many employees do not change the default passwords they get to use soft... Read more
CrowdStrike offers service against identity-based intrusions
CrowdStrike announces a new cybersecurity team and service offering: CrowdStrike Counter Adversary Operations. Its first service is Identity Threat Hunting, which addresses identity-based intrusions.
The new CrowdStrike Counter Adversary Operations bundles several existing solutions to enable o... Read more
Hackers succeed more to stay undetected in a corporate network
The number of Kerberoasting identity attacks has increased almost sixfold in the past year. Legitimate RMM tools, in turn, are being used three times more by hackers. Above all, these trends seem to show that hackers are looking for ways to fool around unseen in a corporate network for a longer per... Read more
Login credentials are the main entry point for hackers into your cloud
In the spring, hackers broke into companies' cloud services primarily through employee login credentials. So IT teams better make it a priority to strengthen authentication methods and follow up on data breaches.
Hackers were able to enter enterprise cloud environments most often by misusing lo... Read more
Zeroday in Ivanti software exposes mainly Western countries
Servers containing Ivanti's Endpoint Manager Mobile (EPMM) solution and therefore two vulnerabilities are mainly in possession of Western companies and governments. Patches are available, but cybersecurity specialists fear hackers already breached most networks. The story started when Norway discov... Read more
Hackers have been exploiting zero-day in Ivanti software since April
The vulnerability in Ivanti software has been exploited since at least April. That is what cyber security services from Norway and the US know.
CISA from the U.S. and the Norwegian National Cyber Security Centre (NCSC-NO) are jointly releasing an advisory report, looking deeper into the zero-da... Read more
Government and public sector in demand by hackers
Last quarter, hackers mainly set their sights on government agencies and the public sector. The number of attacks increased by forty percent from a quarter earlier.
Governments and the public sector are in demand by hackers. BlackBerry's Quarterly Global Threat Intelligence report sees a 40 per... Read more
Hackers claim theft of 30 million Microsoft account logins
Microsoft denies that login credentials of 30 million customers were stolen in a hacking attack by the group Anonymous Sudan.
According to a spokesperson for the tech giant, Anonymous Sudan or Storm-1359 did not capture customer data during the earlier hacking attack, BleepingComputer writes.
... Read more
Spyware vendor itself victim of cybercrime
LetMeSpy has been hacked, resulting in the leakage of user data. The so-called mobile "stalkerware" service claims to be mainly useful for legitimate purposes. However, its capabilities are well-suited to the aims of malicious users.
The developer of LetMeSpy says a hacker stole the application'... Read more
These are the most hacked passwords and tactics used in cybercrime
UK payment provider Dojo analyzed over 6 million passwords from the RockYou2021GitHub collection of breached password lists. The study uncovered frequently used passwords, their average length, and the popular subjects that appeared in numerous breaches.
Hackers employ various tactics to crack p... Read more