Skip to main content

Posts

Samsung shipped '100 million' phones with flawed encryption

  Academics at Tel Aviv University in Israel have found that recent Android-based Samsung phones shipped with design flaws that allow the extraction of secret cryptographic keys. If you have Corporate Samsung Phones or BYOD enabled Samsung Phones, you must act now. Read the complete story here.

UEFI firmware vulnerabilities affect at least 25 PC vendors

  Researchers from firmware protection company Binarly have discovered critical vulnerabilities in the UEFI firmware from InsydeH2O used by multiple computer vendors such as Fujitsu, Intel, AMD, Lenovo, Dell, ASUS, HP, Siemens, Microsoft, and Acer. More specifically, a local or remote attacker with administrative privileges exploiting SMM flaws could perform the following tasks: Invalidate many hardware security features (SecureBoot, Intel BootGuard) Install persistent software that cannot be easily erased Create backdoors and back communications channels to steal sensitive data Read the entire story Here

GoDaddy security breach exposes WordPress users' data

  Nov 22 (Reuters) - Web hosting company GoDaddy Inc  (GDDY.N)  said on Monday email addresses of up to 1.2 million active and inactive Managed WordPress customers had been exposed in an unauthorized third-party access. The company said the incident was discovered on Nov. 17 and the third-party accessed the system using a compromised password. Read More here .

Personal information belonging to 25K current and former TTC employees may have been stolen during ransomware attack

Personal information belonging to 25K current and former TTC employees may have been stolen during ransomware attack : Personal information belonging to approximately 25,000 of the TTC’s current and former employees may have been stolen during the course of ransom attack that wreaked havoc on a number of internal and external systems last week.

Acer Hacked in India

  Acer has been hacked again. The hackers claim that they stole 60GB worth of data from companies India operations. The data includes customer, corporate, accounts, and financial data, login info of retailers and distributors. This is the second time this year Acer has been hacked. Previously REvil ransomware gang hacked and demanded %50MM ransom. more info here ..

News This Week: Aug 23, 2021

  VMO collects the best news related to Vendors, Technology, Government Policy, etc. on web every week for you. ------------------------------ Disgruntled employees targeted to deploy ransomware within profitable organizations T-Mobile data breach exposed 50 Million people's data Mandiant (FIREEYE) disclosed a critical vulnerability affecting Millions of IoT devices Fortinet delays a Zero Day Vulnerability  in its Web Application Firewall LockFile, known for ransomware attacks on manufacturing, financial services, engineering and tourism, is exploiting a critical Microsoft Vulnerability. Razer mice could give hackers wide-open local access to your Windows PC Data breaches now cost companies an a$4.24 million per incident on average—the highest cost in the 17-year history - IBM IndiaMart's is possibly unaware of a data breach involving 38 Million records  that is up for grabs on hacking forums. IndiaMart is one of the largest B2B Marketplaces in India. Nvidia's $40B acqui

Ransomware attack on Vendor Kaseya sends shockwaves worldwide

  Kaseya , which is based out of Ireland (International HQ) and Miami (US HQ) provides IT Management solutions to many customers and MSPs. Hundreds of customers including  railway, pharmacy chain and grocery chain in Sweden were hit by this REvil ransomware . The attack is similar to Solarwinds ransomware, in which the hackers managed to hack a software update to push malicious code to thousands of customers.  The hackers have exploited a vulnerability in Kaseya's VSA software against multiple managed service providers (MSP) and their customers. Kaseya announced on Jul 2 that it became infected and has asked the customers to shut down it's VSA servers. "It's critical that you do this immediately because one of the first things the attacker does is shut off administrative access to the VSA," said the Kaseya CEO Fred Voccola. Customers were also notified by Kaseya. The vendor has since shut down it SaaS servers and pull its data centers offline. What is affected? Th

News This Week: Jul 02

  VMO collects the best news related to Vendors, Technology, Government Policy, etc. on web every week for you. ------------------------------ Western Digital urges users to immediately disconnect  WD My Book Live and WD My Book Live Duo after detecting a vulnerability that attacker can use to can remotely wipe the data. A Linux encryptor that targets and encrypts Vmware ESXi virtual machines. The REvil ransomware operation is now using a Linux encryptor to mass encrypt storage used by VMs and NAS devices. Microsoft recommends enabling multi-factor authentication to protect their environments after new activity from the NOBELIUM threat actor. This activity was targeted at specific customers, primarily IT companies (57%), followed by government (20%), and smaller percentages for non-governmental organizations. Babuk Locker Ransomware group releases the builder that encrypts files hosted on Windows systems, ARM-based network storage attached (NAS) devices, and VMWare ESXi servers. Thi

CISA issues Top 2 Cyber Security Bad Practices

  HAPPY CANADA DAY to our Canadian Readers !!   In an effort to alleviate the cyber defense of the Country and the Private Sector, CISA (Cybersecurity & Infrastructure Security Agency) is creating a " Catalog of Bad Practices that are exceptionally risky ". This will be an ever evolving list where items will be constantly added.  CISA suggests that all organizations must have an effective Cyber Security Program that avoids or mitigates these bad practices and protects their assets in line with the criticality of risk. The list suggests two Bad Practices that must be avoided or mitigated. 1. Use of unsupported (or end-of-life) software in service of Critical Infrastructure and National Critical Functions is dangerous and significantly elevates risk to national security, national economic security, and national public health and safety. This dangerous practice is especially egregious in internet-accessible technologies. 2. Use of known/fixed/default passwords and credentia

Would The Risky Government In Israel Affect My Business Operation?

  Israel has got a new coalition government led by Naftali Bennett after Benjamin Netanyahu was unseated after 12 years of reign. Israel has seen 4 elections in merely 2 years, but the opposition was united to oust Netanyahu after allegations of Bribery, Fraud and Breach of Trust .  The new government narrowly won the elections with razor thin majority of 60-59. Polls suggest that 43% Israelis expect the Government to dissolve quickly and only 11% expect it to survive the full term. If the Government fails to survive, would it impact you as a Technology Asset Owner or a Vendor Manager?  It might seem like connecting two disparate topics, but you will be able to connect the dots when I say Israel is a cyber security powerhouse  and has some top tech companies that you might be using today such as CyberArk, Guardicore, NICE, Check Point, Cloudify, Monday, Radware, Wix and Varonis to name a few. I do not know whether the government would fail or not as I am not an expert at International