WordPress Easy WP SMTP zero-day potentially exposes hundreds of thousands of sites to hack

Threat actors are actively exploiting a zero-day vulnerability in the popular Easy WP SMTP WordPress plugin installed on more than 500,000 sites. Hackers are actively exploiting a zero-day vulnerability in the popular Easy WP SMTP WordPress plugin to reset passwords for admin accounts. The SMTP WordPress plugin is installed on more than 500,000 sites, but […]

PgMiner botnet exploits disputed CVE to hack unsecured PostgreSQL DBs

Researchers have discovered a botnet dubbed PgMiner that targets PostgreSQL databases running on Linux servers to install a cryptocurrency miner. Security researchers from Palo Alto Networks have discovered a new botnet, tracked as PgMiner, that targets PostgreSQL databases running on Linux servers to install a cryptocurrency miner. PostgreSQL, also known as Postgres, is one of […]

Most Brits aren’t protecting themselves online when remote working

There’s a false sense of security among the UK workforce, a new report states. (Image credit: Shutterstock.com) There is a “false sense of security” among British employees working remotely, a new report from Fasthosts claims. With remote working becoming the new normal, the majority of the country’s workers conduct their jobs either from home, or […]

2021 Cybersecurity Trends: The Emergence of the Personalized Attack Chain

It’s hard to look forward to 2021 without considering the trends that shaped the largely unpopular year known as #2020. History books will, of course, remember this year mostly for two major events – the COVID-19 pandemic and the US presidential election. From a business perspective, the pandemic has altered nearly every aspect of how […]

The U.S. Government is Creating Security Standards for IoT Devices

A new security bill is awaiting signature by President Trump. It directs the National Institute of Standards and Technology (NIST) to create minimum cybersecurity standards for IoT devices owned or controlled by the U.S. government. The standards will include use and management of IoT devices, as well as coordinated disclosure of vulnerabilities. Let’s take a […]

Google Project Zero expert Ian Beer on Tuesday disclosed a critical “wormable” iOS flaw that could have allowed to hack iPhone devices.

Google Project Zero white-hat hacker Ian Beer has disclosed technical details of a critical “wormable” iOS bug that could have allowed a remote attacker to take over any device in the vicinity over Wi-Fi. Google Project Zero white-hat hacker Ian Beer has disclosed technical details of a critical “wormable” iOS bug that could have allowed […]

Why good Password Management is getting pointless – Deep diving into Account Takeovers

Maybe 2018 was the first year, when user database breaches became one of the most discussed subject in the cybersecurity world: billions of user data has been leaked from Facebook, Marriot, MyHeritage, Google Plus, just to name some. What’s common in these and the similar cases since the last decade is, that not individual accounts, […]

Acronis Cyberthreats Report predicts 2021 will be the “year of extortion”

Acronis, a global leader in cyber protection, today released its Acronis Cyberthreats Report 2020, its in-depth review of the current threat landscape and projections for the coming year. Based on the protection and security challenges that were amplified by the shift to remote work during the COVID-19 pandemic, Acronis warns 2021 will bring aggressive cybercrime activity as […]