Düsseldorf University Hospital has become infected with ransomware through a known vulnerability in Citrix. The disrupted systems caused that the hospital could no longer receive ambulances, among other things. The Ministry of Justice of the German state of North Rhine-Westphalia released a message yesterday that a patient had died as a result of the ransomware […]
The encrypted email service Tutanota has been the target of DDOS attacks for over a month, preventing users from using the service for several days. The attacks began in mid-August and the attackers kept changing their attack vector, Tutanota said. Last weekend, the e-mail service came under fire again and this week it was busy […]
According to the Managed Service Providers based on a study from Altaro, with home workers in mind, they can shift their services to that domain, whereby more devices must be secured outside the company walls. This provides a way to partially offset the losses that MSPs have suffered from the COVID-19 pandemic. Cloud computing and […]
According to Dutch magazine Vrij Nederland (VN), in 2016 three ethical hackers known only as Edwin, Mattijs and Victor, scoured through the password database with the username of Donald Trump’s email address which had leaked out of LinkedIn a few years before. With the helpf of the program John the Ripper – a tool that […]
To protect accounts related to the US presidential election, Twitter will require a strong password for these accounts. These users are also recommended to set up two-factor authentication. The microblogging service has announced this on its own website. In this way, Twitter wants to protect so-called “high-profile accounts” during the upcoming presidential elections. These include […]
CISA and FBI are actively reporting vulnerabilities in F5, Pulse Secure, Citrix, BIG-IP and Exchange
Groups of attackers are actively exploiting known vulnerabilities in F5, Pulse Secure, Citrix, Exchange and BIG-IP to attack organizations, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) of the US Department of Homeland Security said in warnings. It would be groups operating from Iran and China. The group actively searches the Internet for […]
A new survey by research firm Vanson Bourne of 1,350 business IT decision-makers in the US and 13 other countries sought to identify current IoT security vulnerabilities and threats in corporate organizations. One of the questions was a question that asked respondents to identify the strangest IoT devices they found connected to their organization’s networks. […]
Did you ever check the strength of your password or if it was leaked on the Dark Web? How long it will it take to brute force your password or download it in file from the Dark Web? If you don’t want to think about that, please choose your subscription on https://idcontrol.pw!
Fortinet’s “2020 Remote Workforce Cybersecurity Report” conducted among organizations in 17 countries worldwide has some interesting conclusions after the introduction of home working:– 60% of all organizations faced an increase in the number of attack attempts. 34% reported a successful attack.– The biggest challenges surrounding the switch were secure connections, business continuity and access to […]
NCSC learns from every incident and that is brings advice to reduce the chance that organizations will become infected with ransomware and malware and limit the spread of malware within the organization and the impact of the infection. it is important to emphasize two extra measures, namely having tested, up-to-date, offline backups and disabling or […]