Expert Insight On Magellan Health Inc Breach

Following reports from Bleeping Computer, “On April 11, 2020, Magellan discovered it was targeted by a ransomware attack. The unauthorised actor gained access to Magellan’s systems after sending a phishing email on April 6 that impersonated a Magellan client,” Magellan SVP & Chief Compliance Officer John J. DiBernardi Jr says in a breach notification notice filed with the office of […]

Twitter Allows Staff To Work From Home ‘Forever’

"State-Sponsored" Cyber Attacks

As reported by BBC News, Twitter has told staff that they can work from home “forever” if they wish as the company looks towards the future after the coronavirus pandemic. The decision came as the social media giant said its work-from-home measures during the lockdown had been a success. But it also said it would allow […]

1,236 Websites Exposed by Researchers to be Infected With Credit Card Stealers

As reported by Bleeping Computer, in just a few weeks, the security researcher Max Kersten collected over 1,000 domains with payment card skimmers. It exposes the reality that MageCart is still a prevalent threat that targets unprotected webshops. A decade ago, Magecart was first discovered by cybersecurity company RiskIQ. But in the past two years, […]

Response Comments On Ransomware Costs Double If You Pay Up

Organisations could find themselves doubling the cost of clearing up after a ransomware attack if they pay off cybercriminals. According to a new survey for Sophos’ State of Ransomware 2020 report, the average cost of tackling the effect of such an attack, including business downtime, lost orders, operational costs, and more, but not including the […]

Comments: Hackers’ Private Chats Leaked In Stolen WeLeakData Database

Access to High-Value Company Information

Ironically, the database for the defunct hacker forum and data breach marketplace called WeLeakData.com is being sold on the dark web and exposes the private conversations of hackers who used the site. WeLeakData.com was a hacker forum and marketplace that primarily focused on discussing, trading, and selling databases stolen during data breaches and combolists that are used in […]

Expert Comments On Astaroth Malware

Over the past year, the Astaroth infostealer trojan has evolved into one of today’s stealthiest malware strains, containing a slew of anti-analysis and anti-sandbox checks to prevent security researchers from detecting and analysing its operations. The malware has historically targeted Brazilian users ever since it was first spotted in the wild in September 2018. IBM […]

Security Expert Re: U.S. Gov’t Releases Top 10 List Of Exploited Security Vulnerabilities

The US government today released a list of the top 10 security vulnerabilities routinely exploited by foreign cyber actors between 2016 and 2019. Cybersecurity and Infrastructure Security Agency (CISA) and the FBI issued the CVEs alert through the National Cyber Awareness System of the DHS to advise security professionals to prioritize patching these vulnerabilities to help reduce the risk […]

Is Excessive Data Making Your Business Dangerously Overweight?

Are you feeling gluttonous? Bloated? Overweight? We’re not talking about your diet in the Coronavirus shutdown period, but the data on your server. For years, you could have been accumulating information on customers, partners and clients that is now bursting from your data seams. We’ve always held data as the key to our success and […]