KEEP IN TOUCH
Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!
Logistics Giant Warns of BEC Emails Following Ransomware Attack Hellmann Worldwide is warning customers of an increase in fraudulent calls and emails regarding payment transfer and bank account changes after a recent ransomware attack. The attack took place on December 9 and forced the logistics company to shut down its systems to contain the spread
All Log4j, Logback Bugs We Know so Far and Why you MUST Ditch 2.15 Everyone’s heard of the critical log4j zero-day by now. Dubbed ‘Log4Shell,’ the vulnerability has already set the internet on fire. Thus far, the log4j vulnerability, tracked as CVE-2021-44228, has been abused by all kinds of threat actors from state-backed hackers to ransomware gangs and others to inject Monero miners on vulnerable
This Image Looks Very Different on Apple Devices — See for Yourself Take a good look at the image below and the device you are on. Now view it again on an Apple device. Conversely, if you are using an Apple device, view this page on an Android or Windows device. ‘Think different,’ see different
Log4j Attackers Switch to Injecting Monero Miners via RMI Some threat actors exploiting the Apache Log4j vulnerability have switched from LDAP callback URLs to RMI or even used both in a single request for maximum chances of success. This shift is a notable development in the ongoing attack and one that defenders need to be