KEEP IN TOUCH
Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!




VISA: Hackers Increasingly Using Web Shells To Steal Credit Cards Global payments processor VISA warns that threat actors are increasingly deploying web shells on compromised servers to exfiltrate credit card information stolen from online store customers. Web shells are tools (scripts or programs) deployed by threat actors to gain and/or maintain access to hacked servers, remotely
REvil Ransomware Now Changes Password To Auto-Login In Safe Mode A recent change to the REvil ransomware allows the threat actors to automate file encryption via Safe Mode after changing Windows passwords. In March, we reported on a new Windows Safe Mode encryption mode added to the REvil/Sodinokibi ransomware. This mode can be enabled using the -smode
Cisco Fixes Bug Allowing Remote Code Execution With Root Privileges Cisco has released security updates to address a critical pre-authentication remote code execution (RCE) vulnerability affecting SD-WAN vManage Software’s remote management component. The company fixed two other high-severity security vulnerabilities in the user management (CVE-2021-1137) and system file transfer (CVE-2021-1480) functions of the same product
New Cring Ransomware Hits Unpatched Fortinet VPN Devices A vulnerability impacting Fortinet VPNs is being exploited by a new human-operated ransomware strain known as Cring to breach and encrypt industrial sector companies’ networks. Cring ransomware (also known as Crypt3r, Vjiszy1lo, Ghost, Phantom) was discovered by Amigo_A in January and spotted by the CSIRT team of Swiss telecommunications provider Swisscom. The