Blog
Cyber Threat Report
CASE STUDY

Critical Nvidia Security Flaw Exposes Cloud AI Systems to Host Takeover

A stark warning from researchers at Wiz after discovering a TOCTOU (Time-of-check Time-of-Use) vulnerability that exposes enterprise cloud environments to code execution, information disclosure and data tampering attacks. Read More

CISA has released CISA Analysis: Fiscal Year 2023, Risk and Vulnerability Assessments, an analysis detailing the findings from the 143 Risk and Vulnerability Assessments (RVAs) conducted across multiple critical infrastructure sectors in fiscal year 2023 (FY23).

 

We all have memories that are forever etched in our minds, events that were life-changing and we can still vividly recall. I was 10 years old when JFK was assassinated and remember the day clearly. I can also tell you where I was and everything about the day 23 years later when Challenger exploded. 23 years after Challenger we faced September 11, and all of us can share where we were, how we heard about it, and what transpired in the following hours, days, and weeks.

National Public Data Published Its Own Passwords
New details are emerging about a breach at National Public Data (NPD), a consumer data broker that recently spilled hundreds of millions of Americans’ Social Security Numbers, addresses, and phone numbers online. KrebsOnSecurity has learned that another NPD data broker which shares access to the same consumer records inadvertently published the passwords to its back-end database in a file that was freely available from its homepage until today. Read More

Tech contractor exposes data of 4.6 million US voters
The databases, which lacked any password protection, included highly sensitive personal information
such as full names, addresses, dates of birth, Social Security numbers, and driver’s license numbers. Read More

With smaller teams, older technology and fewer resources, small businesses face an increased risk of cyber attacks. In fact, 50% of cyber attacks target small businesses. Small businesses also have a more difficult time recovering from a cyber attack - 60% will close within six months following a cyber security incident. 

Here are some common tactics cyber criminals use, and ways to strengthen your business’ cyber security: 

Hackers leak documents stolen from Pentagon contractor Leidos
Leidos serves prominent clients including the US Department of Defense (DOD), the Department of
Homeland Security (DHS), NASA, and various other US and foreign agencies. Read More

Cisco warns of appliances vulnerable to RegreSSHion vulnerability
Cisco said dozens of its networking and communications devices are likely vulnerable to a recently disclosed SSH vulnerability. Read More

CISA warns chemical facilities may have been hacked in CSAT breach
Attacker may have site security plans for chemical facilities all over the US, CISA warns.
Read More

Cybersecurity incidents can have extensive and far-reaching impacts on businesses, extending well beyond financial losses.

Here are some of the key areas where businesses might experience significant costs due to cybersecurity breaches: