By Eduard Kovacs
SimonMed Imaging was targeted by the Medusa ransomware group, which claimed to have stolen 200 Gb of data.
The post SimonMed Imaging Data Breach Impacts 1.2 Million appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »
By Ionut Arghire
Threat actors used automation to create over 175 malicious NPM packages targeting more than 135 organizations.
The post NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »
By Eduard Kovacs
It’s unclear if the new Oracle E-Business Suite flaw, which can be exploited remotely without authentication, has been used in the wild.
The post Oracle Patches EBS Vulnerability Allowing Access to Sensitive Data appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »
By Ionut Arghire
The authorities arrested GoogleXcoder, the alleged administrator of GXC Team, which offered phishing kits and Android malware.
The post Spanish Authorities Dismantle ‘GXC Team’ Crime-as-a-Service Operation appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »
By Ionut Arghire
The data allegedly pertains to Albertsons, Engie Resources, Fujifilm, GAP, Qantas, and Vietnam Airlines.
The post Extortion Group Leaks Millions of Records From Salesforce Hacks appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »
Staff burnout cited as top concern for security leaders.
Source:: Security magazin


Posted in Uncategorized | No Comments »
Threat actors are evolving too quickly for organizations to keep up.
Source:: Security magazin


Posted in Uncategorized | No Comments »
Help desks are often the first line of defense for malicious identity verification activity, yet are among the most under-protected entry points in the enterprise.
Source:: Security magazin


Posted in Uncategorized | No Comments »
By SecurityWeek News
Other noteworthy stories that might have slipped under the radar: US universities targeted by payroll pirates, Zimbra vulnerability exploited, Mic-E-Mouse attack.
The post In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »
By Ionut Arghire
GreyNoise has discovered that attacks exploiting Cisco, Fortinet, and Palo Alto Networks vulnerabilities are launched from the same infrastructure.
The post Cisco, Fortinet, Palo Alto Networks Devices Targeted in Coordinated Campaign appeared first on SecurityWeek.
Source:: securityweek


Posted in Uncategorized | No Comments »