Tag: communications
-
Use Signal or other secure communications app
by
in SecurityNewsIn the wake of the widespread compromise of US telecom giants’ networks by Chinese hackers and the FBI advising Americans to use end-to-end encrypted communications, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/20/cisa-guide-secure-communications-mfa-iphone-android-signal/
-
Russia fires its biggest cyberweapon against Ukraine
by
in SecurityNews
Tags: access, attack, breach, cisa, communications, country, cyber, cyberattack, defense, email, governance, government, group, incident response, infrastructure, intelligence, microsoft, mitigation, mobile, risk, russia, service, strategy, threat, ukraine, vulnerability, warfareUkraine has faced one of the most severe cyberattacks in recent history, targeting its state registries and temporarily disrupting access to critical government records.Ukrainian Deputy Prime Minister Olga Stefanishyna attributed the attack to Russian operatives, describing it as an attempt to destabilize the country’s vital digital infrastructure amid the ongoing war.”It’s already clear that the…
-
CISA Released Secure Mobile Communication Best Practices 2025
by
in SecurityNews
Tags: best-practice, china, cisa, communications, cyber, cybersecurity, espionage, infrastructure, malicious, mobile, threatThe Cybersecurity and Infrastructure Security Agency (CISA) has released new best practice guidance to safeguard mobile communications amid rising concerns over cyber espionage activities linked to People’s Republic of China (PRC)-affiliated threat actors. These malicious actors have been targeting commercial telecommunications infrastructure to intercept call records and compromise the private communications of highly targeted individuals,…
-
ConnectOnCall Data Breach, 900,000 Customers Data Exposed
by
in SecurityNewsThe healthcare communication platform ConnectOnCall, operated by ConnectOnCall.com, LLC, has confirmed a significant data breach that compromised the personal information of 900,000 patients and healthcare providers. The platform, designed to streamline after-hours communications between patients and healthcare providers, discovered the breach in May of this year. The breach was identified onMay 12, 2024, prompting an…
-
Clop Ransomware Takes Responsibility for Cleo Mass Exploits
by
in SecurityNewsFile-Transfer Software Being Exploited by One or More Groups; Vendor Pushes Patches. The ransomware group Clop is claiming credit for the mass exploitation of managed file-transfer software built by Cleo Communications, following on from the similar targeting of MOVEit file-transfer in 2023. Many large organizations rely on the MFT server software to securely transfer files.…
-
Cyberangriff auf einen Telekommunikationsdienstleister in Neuseeland
by
in SecurityNewsKiwi telco Compass Communications confirms ransomware attack First seen on cyberdaily.au Jump to article: www.cyberdaily.au/security/11490-exclusive-kiwi-telco-compass-communications-confirms-ransomware-attack
-
The Hidden Risks of Mobile Calls and Messages: Why EndEnd Encryption is Just the Starting Line
by
in SecurityNews
Tags: access, android, breach, business, communications, control, cybercrime, cybersecurity, data, encryption, endpoint, espionage, government, identity, intelligence, mobile, network, risk, service, startup, technology, threat, tool, update, vulnerabilityThe recent breaches of sovereign telecom networks in the United States, underscores how highly connected but fragmented public networks are increasingly vulnerable to sophisticated attacks. Another rising concern is the blind trust organizations and individuals put into consumer-grade messaging apps such as WhatsApp to share government and commercially-sensitive information. Some of the biggest risks concerning these…
-
Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action
by
in SecurityNewsGermany’s Federal Office of Information Security (BSI) has announced that it has disrupted a malware operation called BADBOX that came preloaded on at least 30,000 internet-connected devices sold across the country.In a statement published earlier this week, authorities said they severed the communications between the devices and their command-and-control (C2) servers by sinkholing the domains…
-
Why the Recent Telecom Hack Underscores the Need for EndEnd Encryption
by
in SecurityNewsThe recent massive telecom hack by the Chinese state-sponsored group Salt Typhoon has highlighted critical vulnerabilities in traditional communication systems. The breach targeted major U.S. telecom providers, including Verizon, AT&T, and T-Mobile, compromising sensitive communications of government officials, political entities, and businesses. Attackers accessed call records, unencrypted text messages, and even live call audio by……
-
Russia blocks Viber in latest attempt to censor communications
by
in SecurityNewsRussian telecommunications watchdog Roskomnadzor has blocked the Viber encrypted messaging app, used by hundreds of millions worldwide, for violating the country’s legislation. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/russia-blocks-viber-in-latest-attempt-to-censor-communications/
-
Thales and Imperva Win Big in 2024
by
in SecurityNews
Tags: access, api, application-security, attack, authentication, banking, business, ciso, cloud, communications, compliance, conference, control, cyber, cybersecurity, data, ddos, defense, encryption, firewall, gartner, group, guide, iam, identity, infosec, insurance, intelligence, malicious, mfa, microsoft, monitoring, privacy, risk, saas, service, software, strategy, threat, usaThales and Imperva Win Big in 2024 madhav Fri, 12/13/2024 – 09:36 At Thales and Imperva, we are driven by our commitment to make the world safer, and nothing brings us more satisfaction than protecting our customers from daily cybersecurity threats. But that doesn’t mean we don’t appreciate winning the occasional award. In the year…
-
CISA Enhances Public Safety Communications with New Resources in Cyber Resiliency Toolkit
by
in SecurityNewsThe Cybersecurity and Infrastructure Security Agency (CISA) has updated its Public Safety Communications and Cyber Resiliency Toolkit with the release of seven new resources aimed at improving the security and resilience of communication systems used by public safety agencies nationwide. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/cisa-cyber-resiliency-toolkit-update/
-
New Malware Framework Targets Cleo File Systems
by
in SecurityNewsPossible Long-Term Attack by Unknown Hackers Thwarted. Hackers exploiting flaws in Cleo Communications software instances had intimate knowledge of their internals and deployed a previously unknown family of malware, security researchers from Huntress said Thursday. Cleo published a patch Wednesday evening. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/new-malware-framework-targets-cleo-file-systems-a-27045
-
Efforts to Secure US Telcos Beset by Salt Typhoon Might Fall Flat
by
in SecurityNews
Tags: communicationsThe rules necessary to secure US communications have already been in place for 30 years, argues Sen. Wyden, the FCC just hasn’t enforced them. It’s unclear if they will help. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/efforts-secure-us-telcos-salt-typhoon
-
Hackers Exploiting Cleo Software Zero-Day
by
in SecurityNewsAttackers Target Managed File Transfer Software Vulnerabilities. File transfer software made by Cleo Communications is under active attack and a patch meant to stymie hackers doesn’t fix the flaw, say security researchers from Huntress. Hackers exploit an arbitrary file-write vulnerability along with a feature that automatically executes files. First seen on govinfosecurity.com Jump to article:…
-
CISA and FCC Issue Urgent Call for Cyber Hardening for Communications Infrastructure
by
in SecurityNewsCISA has released new cybersecurity guidelines for communications infrastructure. The guidance comes in the wake of a series of disclosures that massive Telecommunications Carriers have been compromised by Salt Typhoon and other China-sponsored adversaries. At the same time, the U.S. Federal Communications Commission (FCC) has proposed a Declaratory Ruling to require telecommunications carriers to protect……
-
Why did China hack the world’s phone networks?
by
in SecurityNews
Tags: access, breach, china, communications, cyberattack, cybercrime, cybersecurity, government, group, hacker, Internet, microsoft, network, phone, service, technologySalt Typhoon breached dozens of telecoms around the world<ul><li><a href=”https://www.theguardian.com/info/2022/sep/20/sign-up-for-the-techscape-newsletter-our-free-technology-email”>Don’t get TechScape delivered to your inbox? Sign up here</li></ul>Chinese hackers <a href=”https://www.theguardian.com/technology/2024/dec/04/chinese-hackers-american-cell-phones”>have breached dozens of telecommunications companies around the world. The breach, christened Salt Typhoon by Microsoft cybersecurity researchers, has afforded the cybercriminals unprecedented access not only to information on who has been texting or…
-
IT-Trends 2025 Video-Statements von Experten der Netzpalaver-Community
by
in SecurityNewsAlle Märkte der ITK-Branche sind im Umbruch. Grund: die künstliche Intelligenz. Optimierungen, Effizienz, Automatisierung, Einsparungen, Customer-Experience, Fachkräftemangel etc. LLMs, KI-Agenten und Embedded-Systeme revolutionieren die Datacenter, die Cybersicherheit, Unified-Communications, die Programmierung und sämtliche Aspekte der IT-Infrastruktur. Das Jahr 2025 steht vor etlichen Herausforderungen in Bezug auf die künstliche Intelligenz und vielen weiteren Trends. Welche das sind,…
-
Ransomware Hackers Exploiting Cleo Software Zero-Day
by
in SecurityNews
Tags: attack, communications, exploit, flaw, hacker, ransomware, software, update, vulnerability, zero-dayAttackers Target Managed File Transfer Software Vulnerabilities. File transfer software made by Cleo Communications is under active attack and a patch meant to stymie hackers doesn’t fix the flaw, say security researchers from Huntress. Hackers exploit an arbitrary file-write vulnerability along with a feature that automatically executes files. First seen on govinfosecurity.com Jump to article:…
-
US Senator announces new bill to secure telecom companies in wake of Chinese hacks
by
in SecurityNewsU.S. Democratic Senator Ron Wyden announced a new draft bill with the goal of securing American telephone networks and Americans’ communications in response to the massive hack of telecom providers allegedly done by Chinese government hackers. In a press release on Tuesday, Wyden announced the Secure American Communications Act. The bill would order the Federal…
-
Decoding SMS Pumping Fraud: Protecting Your Communications
by
in SecurityNewsIn the digital-first world, SMS messaging remains a common security mechanism for second factor and other verification communication. Whether verifying accounts through one-time passwords (OTPs), notifying customers about transactions, or sharing promotions, organizations across industries often rely on SMS as a reliable channel. Yet, this trust has been exploited by cybercriminals through SMS pumping fraud,……
-
FCC Takes Action to Strengthen Cybersecurity in Response to Salt Typhoon Cyberattack
by
in SecurityNewsThe Federal Communications Commission (FCC) is taking decisive action to bolster the cybersecurity of U.S. telecommunications networks in the wake of the Salt Typhoon cyberattack, a sophisticated intrusion attributed to... First seen on securityonline.info Jump to article: securityonline.info/fcc-takes-action-to-strengthen-cybersecurity-in-response-to-salt-typhoon-cyberattack/
-
Attackers Can Use QR Codes to Bypass Browser Isolation
by
in SecurityNewsResearchers demonstrate a proof-of-concept cyberattack vector that gets around remote, on-premises, and local versions of browser isolation security technology to send malicious communications from an attacker-controlled server. First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/attackers-qr-codes-bypass-browser-isolation
-
Seven Bolt-Ons to Make Your Entra ID More Secure for Critical Sessions
by
in SecurityNewsIdentity security is all the rage right now, and rightfully so. Securing identities that access an organization’s resources is a sound security model.But IDs have their limits, and there are many use cases when a business should add other layers of security to a strong identity. And this is what we at SSH Communications Security…
-
Resecurity introduces AI-powered GSOC at NATO Edge 2024
by
in SecurityNewsResecurity, a global leader in cybersecurity solutions, unveiled its advanced Government Security Operations Center (GSOC) during NATO Edge 2024, the NATO Communications and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/06/resecurity-gsoc/
-
8 US telcos compromised, FBI advises Americans to use encrypted communications
by
in SecurityNewsFBI and Cybersecurity and Infrastructure Security Agency (CISA) officials have advised Americans to use encrypted call and messaging apps to protect their communications from … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/05/us-telcos-compromised-fbi-advises-use-of-encrypted-communications/
-
What is PHI? (Protected Health Information)
by
in SecurityNewsProtected Health Information (PHI) is a critical aspect of healthcare, encompassing any data that can identify an individual and is used in the context of medical care. Examples of PHI include personal identifiers (name, address, Social Security number), medical records, health insurance information, and even communications containing health details. The post What is PHI? (Protected…