F5 BIG-IP Exploit, WiFi Router Security Updates, Password Reuse

In episode 129 for July 13th 2020: Impact of the F5-BIG-IP critical vulnerability, security updates and your WiFi router, and details about new research that shows how billions of compromised credentials are ...
Fake Outlook Credential Upgrade Campaign Phishes for Employee Credentials

Fake Outlook Credential Upgrade Campaign Phishes for Employee Credentials

Bad actors are using a message disguised as an official notification from the Outlook team to trick people into entering their credentials into a phishing website, leaking them in the process and ...
Billions of Leaked Credentials Available on the Dark Web

Billions of Leaked Credentials Available on the Dark Web

Researchers have found over 15 billion credentials from more than 100,000 data breaches on the dark web, including access to everything from streaming services to banking accounts and financial services. Despite what ...
Hackers Use VPN Impersonation in Phishing Emails to Steal Office 365 Credentials

Hackers Use VPN Impersonation in Phishing Emails to Steal Office 365 Credentials

A phishing attack is using VPN impersonation to trick people into revealing their Microsoft Office 365 credentials. With so many people working from home, VPN use has increased considerably. Most companies rely ...
European Cyber Units Dismantle InfinityBlack Hacking Group in Poland

European Cyber Units Dismantle InfinityBlack Hacking Group in Poland

InfinityBlack, a hacking group based in Poland and Switzerland, was taken down by Polish and Swiss law enforcement after the arrest of five alleged active members. InfinityBlack has a very specific operating ...
wfh

The Linux Foundation Takes on Digital Trust With ToIP Foundation

The Linux Foundation announced it will host the Trust over IP (ToIP) Foundation, an independent project to enable trustworthy exchange and verification of data between any two parties on the internet in ...
Security Boulevard
Zoom Phishing Campaign Tricks People into Revealing Login Credentials

Zoom Phishing Campaign Tricks People into Revealing Login Credentials

A new Zoom phishing campaign preys on people’s fears related to job security, tricking them into revealing credentials that criminals can abuse in a variety of ways. The practice of Zoom-bombing is ...

Emotet Malware Causes Physical Damage

Microsoft is reporting that an Emotet malware infection shut down a network by causing computers to overheat and then crash. The Emotet payload was delivered and executed on the systems of Fabrikam ...
https://www.sersanoconsulting.com/wp-content/uploads/2017/09/AdobeStock_155061463-Converted-copy.jpg

Why Most Are Leaving LDAP With WPA2-Enterprise Behind

For years, the credential-based network authentication standard was the Lightweight Directory Access Protocol (LDAP). The security and efficiency offered by LDAP provided the necessary protection levels for everyday WPA2-Enterprise operations. But as ...
This is how hackers hack you using simple social engineering

Stronger Multi-Factor Authentication With Certificates

It’s widely held knowledge that using a single factor for authentication to wireless networks is less than secure and easily exploited by hackers. Many organizations recognize this and utilize Multi-Factor Authentication (MFA) ...