One of the best ways for organisations to innovate at a faster pace is to use open source inside their technology stack. By harnessing open source, developers don’t have to waste time coding from scratch, but instead can tap into knowledge and resources from the vast global communities. These clear benefits have fuelled open source adoption by enterprises the world over; according to research from Synopsys, open source code is a part of roughly 99% of commercial codebases. But it is not without risks, and security is one of the chief concerns when it comes to open source technologies. That same study from Synopsys also tells us…
Author: ISBuzz Team
Over 500,000 Activision accounts have reportedly been hacked in a new Activision data breach on September 20, leaving Call of Duty players in limbo. All Call of Duty players should be on notice after a major Activision hack has left millions of accounts in limbo. As of the time of publishing, over 500,000 Activision accounts have reportedly been hacked, with log-ins being leaked publicly. Hackers are then changing the account details, making it so the original owners can’t recover them. The breach was first reported by ‘oRemyy’ on Twitter. This was then confirmed by other content creators, like TheGamingRevolution, Prototype…
The source code for a popular Android banking malware strain has been released online via public forums, raising fears of attacks coming soon, according to Tech Radar. Originally, the operators of the Cerberus trojan – first identified in mid-2019 – attempted to auction off the code to other cybercriminal syndicates, but they have now abandoned the material online for anyone to use. As a result, researchers have witnessed an immediate spike in the number of mobile infections, as cybercriminals harness the complex and sophisticated Android malware to defraud users across Europe.
The COVID-19 pandemic has forced organizations to pivot quickly from a fully on-prem or hybrid on-prem/remote office setting to a nearly 100 percent remote work environment. One of the most pressing challenges of this transition has been the instantaneous shift in how organizations must approach cybersecurity. To best protect data in a remote workforce, it is critical to first identify risks associated with this transformation, and then institute best practices that will strengthen security and reduce data exposure. Understanding the threats When employees move from a single, secure business network to home networks, they generally have less-robust security protections. While…
The Associated Press is among outlets reporting the US bans WeChat, TikTok from app stores, threatens shutdowns. Privacy and cybersecurity experts offer perspective.
Iranian hackers, most likely employees or affiliates of the government, have been running a vast cyberespionage operation equipped with surveillance tools that can outsmart encrypted messaging systems — a capability Iran was not previously known to possess, according to two digital security reports released Friday. The operation not only targets domestic dissidents, religious and ethnic minorities and antigovernment activists abroad, but can also be used to spy on the general public inside Iran, said the reports by Check Point Software Technologies, a cybersecurity technology firm, and the Miaan Group, a human rights organization that focuses on digital security in the…
Students’ return to universities has coincided with a spate of attacks against academic institutions across the North of England, prompting the National Cyber Security Centre to issue a warning: prepare for disruption as the term starts. Academia has a unique security profile due to the sector’s open, collaborative nature, making user-based vulnerabilities a particular challenge. Universities’ involvement in critical research, most notably vaccines for Covid-19, has encouraged hackers to target them with ransomware in combination with phishing, credential harvesting and brute force attacks.
On Wednesday, September 16th, the Department of Justice announced that Chinese hackers from a group called APT41 hacked into at least 100 companies in the U.S and worldwide. The series of attacks involved the theft and abuse of code-signing certificates – yet another textbook example of the need to protect and manage keys and certificates, especially those used to sign code.
A patient has died as result of a cyberattack at a German hospital. As per hospital investogation, hacker attacked a weak spot in “widely used commercial add-on software,” resulting in system crashed and the hospital wasn’t able to access data; emergency patients were taken elsewhere and operations postponed. Cybersecurity experts reacted below on this critical incident.
Figures from UK Finance reveal that impersonation scams have almost doubled in the first six months of the year, with almost 15,000 cases reported between January and June 2020.