The day's top cybersecurity news and in-depth coverage
January 15, 2022
According to analysis by firmware security firm Eclypsium, 7,799 HPE iLO (HPE's Integrated Lights-Out) server baseboard management controllers (BMCs) are exposed to the internet and most do not appear to be running the latest version of the firmware. But the problem doesn't stop there. Read more â¶
You have native options to better secure Microsoft 365. Use them effectively and you might save time and money spent on other solutions.
The U.S. Department of Justice claims Filippo Bernardini leveraged knowledge gained by working at Simon & Schuster and other publishers to create fake identities and websites to steal intellectual property.
The U.S. cybersecurity agency can't rule out that adversaries are using Log4j to gain persistent access to launch attacks later.
Is that security trend hot or not? From tools and technologies to threats and tactics, the numbers don't lie.
Elephant Beetle specializes in stealing money from financial and commerce firms over an extended period of time while remaining undetected.
Cybercriminals adopt tactics to disguise credential stuffing activity and avoid basic prevention schemes like CAPTHCAs.