April 17, 2024
Via: CSO OnlineResearch highlights heightened threat actor interests in SAP systems, targeting poorly patched organizations. Targeting SAP vulnerabilities by threat actors is currently at its peak as systems compromised by ransomware incidents have grown fivefold since 2021, according to joint research by […]
April 17, 2024
Via: TechRadarMultiple versions of the PuTTY SSH client were found to be vulnerable to a high-severity flaw which allowed, in certain scenarios, threat actors to exfiltrate private keys used to generate cryptographic signatures. As a result, the attackers could gain unauthorized […]
July 24, 2023
Via: TechRadarMicrosoft has denied claims that the Chinese threat actors who recently broke into its systems could have cracked its cloud services as well. The company is standing by its previous assessment that it was only Exchange Online and Outlook.com that […]
September 5, 2018
Via: Talkin' CloudContrary to some recent reports, ransomware attacks aren’t decreasing among small and midsize customers; instead, they’re transforming, as malicious hackers become smarter and more sophisticated with how they carry out their attacks. Increasingly, attackers are discovering new ways to go […]
August 9, 2018
Via: Talkin' CloudPeople around the world are becoming increasingly connected with smart devices. Sending and receiving massive amounts of data back and forth, we rely on the transfer and storage of data on a daily basis. Hackers and cyber attackers know this […]
October 3, 2016
Via: InfoWorld Cloud ComputingThere are two major types of public cloud computing attacks: single-tenant and cross-tenant. A cross-tenant attack is the stuff of IT nightmares, but it has not yet occurred. (In a cross-tenant attack, the hackers gain root-level access to the cloud and […]