The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new version of “Malware Next-Gen,” now allowing the public to submit malware samples for analysis by CISA. […]
OpenTable is adding your first name to previously anonymous reviews
Restaurant reservation platform OpenTable says that all reviews on the platform will no longer be fully anonymous starting May 22nd and will now show members’ profile pictures and first names. […]
LastPass: Hackers targeted employee in failed deepfake CEO call
LastPass revealed this week that threat actors targeted one of its employees in a voice phishing attack, using deepfake audio to impersonate Karim Toubba, the company’s Chief Executive Officer. […]
Optics giant Hoya hit with $10 million ransomware demand
A recent cyberattack on Hoya Corporation was conducted by the ‘Hunters International’ ransomware operation, which demanded a $10 million ransom for a file decryptor and not to release files stolen during the attack. […]
CISA orders agencies impacted by Microsoft hack to mitigate risks
CISA has issued a new emergency directive ordering U.S. federal agencies to address risks resulting from the breach of multiple Microsoft corporate email accounts by the Russian APT29 hacking group. […]
Intel and Lenovo servers impacted by 6-year-old BMC flaw
An almost 6-year-old vulnerability in the Lighttpd web server used in Baseboard Management Controllers has been overlooked by many device vendors, including Intel and Lenovo. […]
CISA says Sisense hack impacts critical infrastructure orgs
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is investigating the recent breach of data analytics company Sisense, an incident that also impacted critical infrastructure organizations. […]
Apple: Mercenary spyware attacks target iPhone users in 92 countries
Apple has been notifying iPhone users in 92 countries about a “mercenary spyware attack” attempting to remotely compromise their device. […]
How to automate up to 90% of IT offboarding tasks
Employee offboarding isn’t anybody’s favorite task—but it’s a critical IT process that needs to be executed diligently and efficiently. Learn more from Nudge Security on automating offboarding of users in a secure manner. […]
