Hiring Your VPs: When Can You Compromise? (UPDATED)

Hiring Your VPs: When Can You Compromise? (UPDATED)

Sometimes, you just have to lower the bar to get a hire done You've just run out of time, and you can't find someone great Only thing is I've never seen a single one of those hires work out —...
Hackers compromise Zimbra email accounts in phishing campaign

Hackers compromise Zimbra email accounts in phishing campaign

Hackers are targeting Zimbra Collaboration email servers in an ongoing phishing campaign, researchers have discovered. According to a report from Slovak software company ESET, the attackers have been gathering credentials of Zimbra account users since at least April. The researchers...

Introducing the cyberspace sand table series: The DNC compromise.

When I used to be a younger captain in the U.S. Army, I used to be the sign officer for a area artillery battalion at Fort Polk, Louisiana. That’s the similar Fort Polk that the Army created again in the...

Chinese Hackers Cyber Espionage Campaign Linked To Microsoft Exchange Servers Compromise At Least 30,000 U.S. Organizations

At least 30,000 U.S. organizations are victims of an unusually aggressive Chinese cyber-espionage unit exploiting vulnerabilities in Microsoft Exchange mail Server software program. The beforehand unknown state-sponsored Chinese hackers recognized as “Hafnium” had been exploiting 4 vulnerabilities CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065, whose discovery was credited to a Virginia-based cybersecurity agency Volexity. The...

Dual vulnerability combo in popular CMS Joomla could lead to ‘full system compromise’

Patch issued for one flaw, however Joomla maintainers contest the severity of a second bugUPDATED Security researchers have revealed the small print of two vulnerabilities in Joomla – the popular content material administration system – which, if chained collectively, they...

Business Email Compromise Costs Businesses More …

Ransomware will get the headlines, however enterprise paid out $1.8 billion final yr to resolve BEC points, in accordance with an FBI report. It's readily obvious that ransomware — and its evolution into extortionware — is a critically critical risk....