Password Recovery Tool Infects Industrial Systems With Malware

Security researchers at Dragos have uncovered the activities of a threat actor that uses password recovery tools to infect industrial control systems (ICS). After analyzing an incident involving Automation Direct’s DirectLogic PLCs, the researchers discovered that the cracking software exploited a known vulnerability in the device to extract the password. The software also dropped a […]

Deleting Files On Devices Cannot Completely Erase Information

Unknown to many, deleting files on their devices does not mean that these files cannot be recovered. According to security researchers, data does not disappear when users delete a piece of data from their device. Instead, the device in question designates that space as available to be overwritten by new information. According to Alfred Demirjian, […]

Thousands Of Twitter Users Report Outage

Thousands of Twitter users were unable to access the platform for about an hour on Thursday afternoon. Downdetector, which monitors the outage, received notifications from users at 12:45 BST and by 13:12, almost 30,000 notifications had been received by the platform. While the problem appears to have been fixed by 13: 45, Twitter tweeted at […]

Celsius Clients Face Uncertainty Over Their Funds

Six lawyers who specialize in bankruptcies have said they are unsure when Celsius customers will be refunded after the crypto lender filed for bankruptcy. While filing for bankruptcy at the U.S. Bankruptcy Court for Southern District of New York, Celsius estimated its assets and liabilities as between US$1 billion to US$10 billion, with more than […]

U.S. Needs US$3 Billion More To Fund The Removal Of Huawei And ZTE

The United States telecoms regulator needs an additional US$3 billion to fund the removal of devices from U.S. networks of equipment made by Chinese telecoms companies Huawei and ZTE. “To fund all reasonable and supported cost estimates…, The Reimbursement Program will require US$4.98 billion, reflecting a current shortfall of US$3.08 billion. Since Congress only appropriated […]

Elon Musk Tries To Block Twitter’s Request For Quick Trial

Elon Musk, through his lawyers, filed a motion with the Delaware Chancery Court to block Twitter’s request to speed up the process that could force the billionaire to buy the company. Musk’s lawyers requested that Twitter’s “unjustifiable request” to rush the merger case to trial in two months be denied. “Twitter’s sudden request for warp […]

North Korean Hackers Targets Businesses With H0lyGh0st Ransomware

A group of North Korean hackers called H0lyGh0st are targeting small and medium-sized enterprises with ransomware attacks. Microsoft Threat Intelligence Center classify the group as DEV-0530, a term for unknown emerging, or an evolving group of threat activities. DEV-0530 demand ransoms between 1,2 and 5 Bitcoins. DEV-0530 is believed to have links to several other […]

5 Cybersecurity Lessons From The CISOs Of Smaller Enterprises Survey

There are five lessons that any organization must learn from the Chief Information Security Officer (CISO) survey of small cybersecurity teams. This include the position that remote work has accelerated the deployment of Endpoint Detection and Response (EDR) technologies. Others include the fact that 90% of CISOs now use a Managed Detection and Response (MDR) solution, […]