intgr8r

FBI, CISA warn of disinformation ahead of midterms

Foreign actors may intensify efforts to influence outcomes of the 2022 midterm elections Posted: October 15, 2022 by Malwarebytes Labs In less than four weeks, the balance of power in the US House of Representatives and Senate will be up for grabs, along with a host of gubernatorial seats, and positions at the state and municipal levels. With […]

FBI, CISA warn of disinformation ahead of midterms Read More »

Chinese APT’s favorite vulnerabilities revealed

In a joint cybersecurity advisory, the National Security Agency (NSA) Posted: October 13, 2022 by Malwarebytes Labs In a joint cybersecurity advisory, the National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), and the Federal Bureau of Investigation (FBI) have revealed the top CVEs used by state-sponsored threat actors from China. The advisory aims to “inform federal and

Chinese APT’s favorite vulnerabilities revealed Read More »

Update now! October patch Tuesday fixes actively used zero-day…but not the one you expected

Microsoft fixed 84 vulnerabilities in its October 2022 Patch Tuesday updates Posted: October 12, 2022 by Pieter Arntz . Thirteen of them received the classification ‘Critical’. Among them are a zero-day vulnerability that’s being actively exploited, and another that hasn’t been spotted in the wild yet. The bad news is that the much-desired fix for the “ProxyNotShell” Exchange vulnerabilities was

Update now! October patch Tuesday fixes actively used zero-day…but not the one you expected Read More »

Android vulnerabilities could allow arbitrary code execution

Posted: October 6, 2022 by Pieter Arntz Several vulnerabilities have been patched in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution. None of the vulnerabilities have been spotted in the wild. Operating systems contain and manage all the programs and applications that a computer or mobile device is able to run. The

Android vulnerabilities could allow arbitrary code execution Read More »

Busting Four Popular Cybersecurity Myths

As the business world becomes increasingly digitized, you’ll have to tackle several dangers that come with doing business online. Cybercriminals nowadays have several methods to target organizations, from credential hacks to sophisticated ransomware attacks. This is why it’s critical to think about measures to protect your organization in every possible way. If you are unfamiliar

Busting Four Popular Cybersecurity Myths Read More »

icon, finance, bank-4102192.jpg

Top 9 IoT-Related Security Threats Businesses Face

The Internet of Things (IoT) is rapidly changing the technology landscape as we know it. Businesses worldwide are leveraging IoT for benefits such as seamless collaboration, access to comprehensive data and the ability to make stronger business decisions based on insights derived from substantial data. Experts estimate the total number of installed IoT-connected devices worldwide

Top 9 IoT-Related Security Threats Businesses Face Read More »

Don’t Let Compliance Violations Affect Your Business

Download our information to learn why checks and balances are essential to ensure your organization always maintains regulatory compliance standards. Is your business at risk of violating compliance regulations? It is critical for businesses of all sizes to avoid compliance violations that can result in financial losses and other penalties. Common violations include failure to

Don’t Let Compliance Violations Affect Your Business Read More »

Defense Strategies to Combat Insider Threats

Insider threats are among the most dangerous cyberthreats out there. Yet, organizations of all sizes seem to be either reluctant or negligent when it comes to fighting them. Even though some companies have an insider risk management program, they have a limited cybersecurity budget for mitigating insider risk.1 Simply having an insider risk management program

Defense Strategies to Combat Insider Threats Read More »

Erbium stealer on the hunt for data

Posted: September 28, 2022 by Christopher Boyd There’s a new slice of malware-as-a-service doing the rounds, although its actual newness is somewhat contested. The stealer, called Erbium, was first spotted on forums back in July 2022, but it seems nobody is quite sure when it started being deployed and snagging victims. Nevertheless, it is now happily causing chaos for

Erbium stealer on the hunt for data Read More »

TikTok faces $28m fine for failing to protect children’s privacy

Posted: September 27, 2022 by Christopher Boyd TikTok is no stranger to controversy where data usage is concerned. Back in 2021, the social media dance extravaganza platform agreed to pay $92m to settle dozens of lawsuits alleging harvesting of personal data. There has also been concern with regard to whether or not settings were enough to keep children safe, leading to significant alterations

TikTok faces $28m fine for failing to protect children’s privacy Read More »