Wednesday, November 30, 2022
Infosecurity Magazine

Oracle Fusion Middleware Vulnerability Actively Exploited in the Wild: CISA

The bug allows unauthenticated attackers with network access to compromise Oracle Access Manager
Infosecurity Magazine

PII May Have Been Stolen in Virginia County Ransomware Attack

A W-2 form was reportedly published on a dark web forum with stolen, sensitive data
Infosecurity Magazine

US Census Bureau Head Fends Off Critics of 'Differential Privacy' Tool

Santos defended differential privacy against prominent researchers
Infosecurity Magazine

Police Shutter 13,000 Sites in Piracy Crackdown

Fourteen detained as part of Europol operation
Infosecurity Magazine

Ireland’s DPC Fines Meta €265m Following Large-Scale Data Leak

The fine followed an inquiry into data processing by Meta in response to a major data breach
Infosecurity Magazine

Experts Find 16,000+ Scam FIFA World Cup Domains

Social media ads and accounts help to drive traffic
Infosecurity Magazine

Web App and API Attacks Surge 257% in Financial Services

Data and credentials at risk in the vertical
Infosecurity Magazine

Elon Musk Unveils End-to-End Encrypted DMs For Twitter 2.0

The E2EE feature was first spotted by mobile researcher Jane Manchun Wong earlier this month
Infosecurity Magazine

Phishing Campaign Impersonating UAE Ministry of Human Resources Grows

New cluster of phishing domains registered using similar naming schemes discovered
Infosecurity Magazine

Millions of Twitter Accounts Potentially Compromised

The breach affected any account with the "Let others find you by your phone" option enabled
Infosecurity Magazine

Orange Cyberdefense Unveils Its Security Navigator With OT Hacking Demos

The cybersecurity arm of Orange Business Services (OBS) organized a launch event at its Lyon campus, in France, for its latest annual threat report
Infosecurity Magazine

Belgian Police Under Fire After Major Ransomware Leak

Crime reports dating back 15 years are made public
Infosecurity Magazine

Russian Sandworm Hackers Linked to New Ransomware Blitz

Ukrainian targets are on the receiving end of RansomBoggs variant
Infosecurity Magazine

African Police Bust $800K Fraud Schemes

International operation lasted four months
Infosecurity Magazine

ConnectWise Fixes XSS Vulnerability that Could Lead to Remote Code Execution

Threat actors could exploit the flaw to take complete control of the ConnectWise platform
TechRepublic

Gartner: How to Respond to the 2022 Cyberthreat Landscape

A new Gartner® report, How to Respond to the 2022 Cyberthreat Landscape, focuses on the new threats organizations will face as they prepare for the future of work and accelerate digital transformations. Gartner’s advice will help security and risk...
TechRepublic

Gartner MQ WAAP 2022

Research shows that web applications and API attacks continued to explode in the first half of 2022. Does your organization have the best defense today? Akamai recommends deploying a holistic web application and API protection (WAAP) solution. The right...
TechRepublic

How Akamai Helps to Mitigate the OWASP API Security Top 10 Vulnerabilities

Experts warn that API attacks will soon become the most common type of web application attack. As a result, organizations and their security vendors need to align across people, processes, and technologies to institute the right protections. The Open...
TechRepublic

What is Account Takeover and How to Prevent It in 2022

An account takeover (ATO), in which criminals impersonate legitimate account owners to take control of an account, are on the rise in Asia and across the world. Fraudsters are swindling money and digital assets from consumers across industries, with...
TechRepublic

The OWASP Top 10 – How Akamai Helps

OWASP publishes a list of the 10 most common vulnerabilities in web applications. This white paper details how Akamai can help mitigate these threat vectors. The post The OWASP Top 10 – How Akamai Helps appeared first on TechRepublic.