“We’re continuing to address the system outage impacting access to the network, applications and customer support,” reads an internal message sent by TTEC to certain employees.
Tenable, a cyber risk management company based in Columbia, Maryland, today announced it has acquired infrastructure-as-code (IaC) technology provider Accurics for $160 million in cash.
The threat actors were able to gain their initial access to the victim by exploiting a vulnerability in a web access server. They further used privilege escalation exploits to steal credentials.
Researchers uncovered that time taken by malware to move laterally within compromised networks has reduced drastically owing to multiple factors such as the shift to work from home culture, growing RaaS infrastructure, and the proliferation of automated tools. It has opened up new doors for threat actors from every skill set. Hence, it is recommended to […]
Latvian network equipment manufacturer MikroTik has shared details on how customers can secure and clean routers compromised by the massive M?ris DDoS botnet over the summer.
The Ragnar Locker ransomware gang has come up with a new way to threaten victims and pressurize them for ransom. The group announced that it would leak the stolen data if victims contact law enforcement agencies. However, experts believe that this latest development is a loose threat to scare victims from doing the right thing.
The Common Weakness Enumeration (CWE) list represents vulnerabilities that have been widely known for years, yet are still being coded into software and being bypassed by testing.
Two legacy IBM System X server models, retired in 2019, are open to attack and will not receive security patches, according to Lenovo. However, the company is offering workaround mitigation.
According to KELA’s report, U.S. companies with a minimum revenue of over $100 million are the top targets of ransomware attackers. Furthermore, about half of the ransomware actors in the dark web reject breach offers pertaining to the healthcare and education sectors. It is advised that organizations invest in cybersecurity measures to stay clear of […]
Two-thirds of cloud security incidents could have been avoided if the configuration of apps, databases, and security policies were correct, new research by IBM X-Force suggests.