Hackers leak stolen COVID‑19 vaccine documents

The documents related to COVID-19 vaccine and medications were stolen from the EU’s medicines agency last month The European Medicines Agency (EMA), which evaluates and approves medicines for the European Union (EU), has disclosed that cybercriminals have posted online a portion of the documents that are related to COVID-19 vaccines

0 Comments

‘Chimera’ Threat Group Abuses Microsoft & Google Cloud Services

Researchers detail a new threat group targeting cloud services to achieve goals aligning with Chinese interests. Security researchers are watching a threat group that takes advantage of Microsoft and Google cloud services with the goal of exfiltrating data across a broad range of target organizations. These attackers have a “wide

0 Comments

Experts Uncover Malware Attacks Against Colombian Government and Companies

Cybersecurity researchers took the wraps off an ongoing surveillance campaign directed against Colombian government institutions and private companies in the energy and metallurgical industries. In a report published by ESET on Tuesday, the Slovak internet security company said the attacks — dubbed “Operation Spalax” — began in 2020, with the

0 Comments

Search engines exposes malicious exploits targeting Home windows and Android users

Now patched, the exploits took advantage of insects in Windows, Chrome, and older versions of Android though watering hole attacks, says Google. Image: iStock/weerapatkiatdumrong Google’s Task Zero is an initiative targeted at uncovering zero-day vulnerabilities and other bugs that could end up being exploited to infect systems and devices with

0 Comments

Become proactive: 3 risk management techniques to take before a cyberattack

Risk management is more than recuperation from a cyberattack. Learn how risk management can help your corporation discover gaps in security, since well as how to deal with the fallout from a cybersecurity event. Image: William_Potter, Getty Images/iStockphoto A lot more about cybersecurity Pundits are pressing risk management as the

0 Comments

Huntress Acquires EDR Technology From Level Effect

Huntress seeks to improve its detection and response capabilities with the more comprehensive view of endpoint security. Huntress, supplier of managed detection and reaction (MDR), has confirmed the obtain of endpoint detection and reaction (EDR) technology from startup Degree Effect. Level Effect offers a platform called Recon, an EDR tool

0 Comments

SolarWinds Attackers May Have Hit Mimecast, Driving New Concerns

Mimecast no longer uses the SolarWinds Orion network management software that served as an attack vector for thousands of organizations. The discovery associated with a data breach at email service provider Mimecast could show attackers behind the massive SolarWinds incident may have pursued multiple paths to infiltrate target companies, a

0 Comments

TikTok Takes Teen Accounts Private

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data may be found in the privacy policy . In addition, you will find them in the message confirming the subscription to the newsletter.

0 Comments

Operation Spalax: Targeted malware attacks in Colombia

ESET researchers uncover attacks targeting Colombian government institutions and private companies, especially from the energy and metallurgical industries In 2020 ESET saw several attacks targeting Colombian entities exclusively. These attacks are still ongoing at the time of writing and are focused on both government institutions and private companies. For the

0 Comments

Intel Adds Hardware-Enabled Ransomware Detection in order to 11th Gen vPro Chips

Intel and Cybereason have partnered to build anti-ransomware defenses into the chipmaker’s newly announced 11th generation Core vPro business-class processors. The hardware-based security enhancements are baked into Intel’s vPro platform via the Hardware Shield and Danger Detection Technology (TDT), enabling profiling and detection associated with ransomware and other threats that

0 Comments