The most impacted group is older Americans, especially people over 60, who filed 147,127 complaints linked to approximately $4.8 billion in losses.
Tag: #vulnerability
Hackers using malware to steal data from USB flash drives | Fox News
When infected, USB drives can spread malware not just within a single organization but also across multiple entities if shared. These attacks don’t rely on network vulnerabilities, allowing them to bypass traditional security tools.
Apartment buildings broken into with phone in minutes — IoT-connected intercoms using default creds vulnerable to anyone with Google | Tom’s Hardware
A number of apartment complexes using internet-connected intercom/entry systems still use their default credentials, which make them fully accessible to anyone savvy enough to Google their unit’s manual.
Misconfig Mapper: Open-source tool to uncover security misconfigurations – Help Net Security
Misconfig Mapper is an open-source CLI tool built in Golang that discovers and enumerates instances of services used within your organization. It performs large-scale detection and misconfiguration assessments, leveraging customizable templates with detection and misconfiguration fingerprints to identify potential security risks in widely used third-party software and services.
How to manage shadow IT and reduce your attack surface
There is a reason why a lot of organizations shy away from people bringing their own devices to work. https://www.bleepingcomputer.com/news/security/how-to-manage-shadow-it-and-reduce-your-attack-surface/
Microsoft warns of ransomware attacks on US healthcare | CSO Online
The threat actor borrowed initial access from a third-party infection to effect lateral movement within the victim system and place INC encryption on their network.
Unpatchable 0-day in surveillance cam is being exploited to install Mirai | Ars Technica
Akamai said that the attackers are exploiting the vulnerability so they can install a variant of Mirai, which arrived in September 2016 when a botnet of infected devices took down cybersecurity news site Krebs on Security.
13WMAZ.com: U.S. says Georgia Tech put ‘sensitive government information’ at risk. Here’s why
The lawsuit lists a number of alleged cybersecurity violations, ranging from a lab’s computers not having anti-virus software and the university having essentially “no enforcement” of required cybersecurity regulations.
‘You basically have to throw your computer away’: Researchers explain AMD ‘Sinkclose’ vulnerability, but do you need to worry? | Laptop Mag
The firmware vulnerability identified by Nissim and Okupski would allow hackers to run their own code in AMD’s System Management Mode, which is intended to run the processor’s firmware.