A bi-weekly roundup of the latest cybersecurity news and research
Halfway down the week and we’ve got you covered till the weekend about all the nitty-gritty in the world of cybersecurity!
Hackers Targeted Apple Devices in Hong Kong for Widespread Attack
The attackers are trying their best to break Apple’s legacy. We all know that Apple is best known for its high-end security but with an increasing number of zero-day vulnerabilities being exploited by attackers, security has become a myth for Apple users this time. To everyone who thinks “I can be careless, who will attack me”, attackers broken myth for you as this time they went for mass spreader rather than going for a targetted attack.
Back-to-Back PlayStation 5 Hacks Hit on the Same Day
A pair of PlayStation 5 breaches show the consoles don’t have protection from attackers taking over its most basic functions. Both exploits were posted on Twitter on Nov. 7 without disclosure to Sony or specifics, but they nonetheless signal potential security problems to come for the gaming giant. FailOverFlow, which has already earned a reputation as a prolific PlayStation jailbreaker group, posted a Nov. 7 tweet that appeared to contain the PS5 firmware symmetric root keys.
Fishing gear seller caught in hacker’s net
“A Fishing website was Phished”, no puns intended you read it right. The hackers are stooping down their levels as recently they attacked a fishing website and redirected it to an explicit website, causing organization reputational and financial loss and users a lot of embarrassment. The company mentioned: The hackers’ motive was pretty clear that they wanted a ransom, though no loss of financial credentials happened.
As we move with the cybersecurity roundup, here is a guide for you: Top 10 Cybersecurity Best Practices to Combat Ransomware
CyberSecurity is no more a delicacy rather an essential meal and as we move forward with the cybersecurity roundup here is a quick 10 ways guide to protect yourself from Ransomware attacks. Ransomware attacks not only causes financial loss but also led to significant downtime and the good news is this guide will help you to be more vigilant online and #BeSecure every time you’re online. Your organization’s powers should be in your hand, own it and flip the table for the threat actors.
‘Tortilla’ Wraps Exchange Servers in ProxyShell Attacks
Babuk with its new “Tortilla” variant exploited the Microsoft Exchange ProxyShell vulnerabilities, this time the aim was to inflict the vulnerable servers. Though we suggest to everyone that staying vigilant can solve most of your cybersecurity problems and implementing a multi-layered defence system will also help in creating a secure environment, it is always better to detect the threats in the early stages, so that effective steps can be taken to stop the infection chain.
How to manage endpoint security in a hybrid work environment
Since the onset of the pandemic, many businesses shifted online without having a clear picture of when, which made cybersecurity a booming concern, 18 months down the line and globally millions are still working remotely. Hybrid working became a new norm, though the business didn’t stop during the pandemic this introduced a range of endpoint security challenges that must be overcome to protect employees and employers.
Clone Phishing – The Replica Expert
Clone phishing is a reality with harmful intent. The weakest link is that users do not suspect or doubt the goal, especially because the spoofed email id or the senders’ name appears genuine and trustworthy. Educating employees on an ongoing basis is an important step that every organization must take, educating may take time but it is still one of the best ways to keep your employees up to date and using smart technologies to save your data is important too. Not just employees educating users should also happen along the way