

Boris Cipot
Senior Sales Engineer feature_status*/ ?>
Synopsys
Comments Dotted :
49
January 21, 2021
Cybercriminals will try to abuse every piece of information they have on you for their own personal gain.
In the wake of this breach, users should change their password on the platform and on any other site where it may have been reused, as hackers can sometimes successfully revert hashed passwords. Users should also be prepared for possible phishing attacks. They should not blindly click on links sent via email. These links may lead you to a malicious site where you will be encouraged to 'change' your password. The same goes for documents - do not download anything without first verifying the
.....Read More
December 09, 2020
The difficulty is in ensuring that devices are patched, particularly for any low cost/high volume product.
One thing that IoT users need to be aware of is that many of the devices on the market and used in their homes will or have already passed the maintenance guarantee period offered by the manufacturer. In other words, the difficulty is in ensuring that devices are patched, particularly for any low cost/high volume product. This same concern also applies to license conflict issues that may surface in the software. Therefore, manufacturers of such products have to put extra energy into “getting.....Read More

November 25, 2020
It is also critical that users are vigilant as their data may be used in phishing campaigns.
Usually, when we hear about hackers offering stolen data, this takes place over deep web forums or pages. In this case, however, we are also seeing the use of social media platforms such as Instagram and messaging apps like Telegram to promote stolen names, usernames, hashed passwords, and email addresses.
Peatix has issued a notification on their webpage about the breach and is also contacting users to change their password on the platform to avoid possible account misuse. Users should,.....Read More

November 19, 2020
Attackers put in a lot of effort to make phishing emails look trustworthy, so you have to put even more effort into spotting them.
Long gone are the days when malware writers did so simply for the fame and credit. We need to understand that, in today's world, malware is focused on monetary gain. Therefore, we can expect that attackers will treat their attacks as a revenue-generating business. As such, it is natural that they will look to determine where previous phishing attacks may have failed and apply the necessary changes. For instance, applying visual and textual corrections to make phishing emails look legitimate......Read More

November 18, 2020
APIs are an integral part of almost every application today.
APIs are an integral part of almost every application today. They enable integration with other systems, communication with databases and provide an interface for configuration of the application. As such, they should be frequently tested in detail. As we see here, the API provides access to the data the application uses.
The security researcher managed to bypass Bumble’s protections and accessed premium features, granting her access to Bumble’s users and personal user data. This security.....Read More

November 17, 2020
All that hackers had to do was find the websites that were easiest to breach.
For many services in South Korea, visitors must first download special security software in order to verify their identity, security status and enable secure downloads prior to gaining access. While the Wizvera software does exhibit security maturity and offers a safeguard to cyber threats, it only does what the configuration file instructs. In other words, the file informs Wizvera on which software it should install. All that hackers had to do was find the websites that were easiest to breach. .....Read More

November 17, 2020
The malware is an information-stealing trojan, taking data from your Chromium, Firefox or Chrome browsers.
Once more, individuals are being tested on their attention to detail. This time, users are having to spot malware disguised as documents. Using the file icon and a name that suggests urgency (e.g a pay raise, travel details, etc.), the user might be compelled to open the document just to read what is written. Even though the malware has a file icon, it is still executable with the file type exe. However, if you are hiding file extensions you might not even see this little scam. The malware is.....Read More

November 13, 2020
One way the cybercriminals may abuse this data is to carry out a phishing attack.
The gaming industry is a common target for attacks, be it data theft or ransomware attacks. An interesting observation within the gaming industry is that player accounts are often high-value assets due to in-app purchases, or rewards from leveling up. In other words, gaming accounts are often items for sale - at least accounts owned my adults spending money. However, we now have proof that even educational games for children are no longer safe, but valuable resources for bad actors.
In this.....Read More

November 10, 2020
Cloud technology is helping organisations in many ways to be better, faster, and more advanced in their operations.
This is not the first, nor the last time, that we will see an organisation unintentionally leak data on its users. As can be expected, there will likely be legal consequences that will cost the organisation a substantial sum.
Nevertheless, it will be the users who will face the most damaging repercussions. They will no doubt see attackers attempt to infiltrate other accounts where passwords may have been reused, as well as phishing attacks sent to exposed email addresses. Financial data such.....Read More

November 09, 2020
Individual targets are only lucrative at scale.
This recent ransomware attack on Campari shows that cybercriminals are not just interested in targeting technology companies. In fact, any and every individual who owns a laptop or a mobile phone is a possible target. However, individual targets are only lucrative at scale. As such, bad actors tend to go for large organisations such as Campari where they can get "more bang for their buck". Indeed, they could demand a ransom worth millions, if they succeed in infiltrating a device with.....Read More
