Second-hand Security Risks: 7 Things to Consider When Buying Used Tech
The Cyber Express
by Editorial
43m ago
As technology evolves rapidly, high-end devices often come with hefty price tags, making second-hand options an attractive alternative. Buying pre-owned gadgets can save you money and allow you to access devices that might otherwise be out of reach. Additionally, some devices may no longer be produced, making second-hand purchases the only option for acquiring specific models or versions. However, purchasing used electronics comes with its own set of risks. Issues like outdated software, lack of security updates, or potential tampering by previous owners can compromise your security. The Best ..read more
Visit website
5 TED Talks by Ethical Hackers that Will Change How You See Cybersecurity
The Cyber Express
by Editorial
43m ago
TED Talks offer a powerful platform for experts and enthusiasts to deliver in-depth discussions on topics of great significance. Among the many subjects TED Talks have explored, technology and its global expansion, including cybersecurity, stand out. In this article, we highlight TED Talks that delve into the often debated and controversial realm of ethical hacking. These talks provide compelling arguments for viewing ethical hacking positively, showcasing how it has played a crucial role in societal advancement and organizational self-awareness.  Despite the often negative connotations ..read more
Visit website
Data Breach at Rhode Island Wyatt Detention Facility Estimated to Affect 20,000
The Cyber Express
by Alan J
7h ago
A data breach at the Donald W. Wyatt Detention Facility in Central Falls, Rhode Island, has impacted nearly 20,700 people, far exceeding initial estimates, according to a class-action lawsuit filed in U.S. District Court last week. The breach, which occurred on Nov. 2, 2023, was initially reported to have affected 1,984 individuals. However, a recent letter from the facility included in the lawsuit reveals the number of victims could be as high as 20,693. Jacob Hellested, who applied for a job at the facility but never worked there, filed the lawsuit on July 19 after receiving notification of ..read more
Visit website
SideWinder APT Group Targets Maritime Facilities in Possible Espionage Campaign
The Cyber Express
by Alan J
10h ago
Researchers have uncovered a new campaign by SideWinder, a nation-state threat actor believed to originate from India that has been active since 2012. Analysis of phishing emails suggests the campaign is targeting ports and maritime facilities in the Indian Ocean and Mediterranean Sea. The attack's first stage implies that the group is targeting Pakistan, Egypt and Sri Lanka, while the second stage indicates additional focus on Bangladesh, Myanmar, Nepal and the Maldives. Researchers believe the campaign's goal is espionage and intelligence gathering, consistent with SideWinder's previous act ..read more
Visit website
India Confirms State-Owned Telecom Giant BSNL’s Data Breach, Millions of User Records Compromised
The Cyber Express
by Krishna Murthy
16h ago
India has confirmed a data breach in the systems of Bharat Sanchar Nigam Limited’s (BSNL), the country’s largest government-owned-telecommunications service provider. The BSNL data breach, reported on May 20, 2024, is the second such cyberattack in a span of six months. India’s Minister of State for Communications, Chandra Sekhar Pemmasani, confirmed the data breach on July 24 in response to a query from opposition MP Amar Singh in the Parliament. BSNL Data Breach in Detail The BSNL data breach was first disclosed by an Indian firm, Athenian Tech, in its threat intelligence report. Accor ..read more
Visit website
Coinbase’s UK Arm Fined £3.5 Million for Lax Anti-Money Laundering Controls
The Cyber Express
by Mihir Bagwe
16h ago
In a groundbreaking move that underscores the escalating scrutiny of cryptocurrency exchanges, UK financial regulators have slapped a first of its kind £3.5 million (approximately $4.5 million) fine on Coinbase’s UK arm, CB Payments Ltd., for egregious failures in anti-money laundering controls. The Financial Conduct Authority (FCA) found that CBPL, despite repeated warnings, allowed billions of dollars to flow through its platform with minimal oversight. "CBPL's controls had significant weaknesses and the FCA told it so, which is why the requirements were needed. CPBL, however, repeatedly br ..read more
Visit website
The Dumbest Thing in Security This Week: CrowdStrike Needs a Grand Gesture
The Cyber Express
by Paul Shread
17h ago
CrowdStrike (CRWD) is in the midst of an unenviable crisis after a faulty update crashed 8.5 million Windows machines around the globe, but some of the company’s moves since then have compounded the problem and are threatening to wreck its stellar image as a leading-edge cybersecurity company. The biggest mistake in the company’s response to the crisis may have been offering Uber Eats and DoorDash vouchers to affected partners. I get the point – the company was saying “I see you” to IT teams laboring long hours and weekends to recover from “blue screen of death” outages. But given the massive ..read more
Visit website
SeleniumGreed: The Growing Threat of Cryptomining via Exposed Selenium Grid Services
The Cyber Express
by Ashish Khaitan
18h ago
Threat actors are increasingly targeting exposed Selenium Grid services to deploy cryptominers, a campaign dubbed "SeleniumGreed." This threat leverages the popular Selenium WebDriver API and has raised significant concerns about the security of cloud environments. Selenium Grid is an integral component of the Selenium suite, used primarily for running tests across multiple machines and environments. It consists of a central hub that manages test distribution to various nodes, which are individual machines capable of executing tests. The grid allows parallel test execution on different b ..read more
Visit website
India Highlights Key Government’s Initiatives to Boost Cybersecurity
The Cyber Express
by Krishna Murthy
18h ago
The Indian Government has once again reiterated its key strategies to strengthen its cyber defense and safeguard its citizens in the digital space. India’s cybersecurity strategy includes spreading awareness on multiple agencies and acts in place to fight cybercrime along with helplines numbers for citizens to report digital frauds. These initiatives were highlighted in an official government press communication released on July 25,  2024. In April this year, the government released a report that by December 2023, India had a whopping 936.16 million internet subscriptions, transforming i ..read more
Visit website
Saving Lives and Data: How Healthcare CTOs Can Combat Rising Cyber Threats
The Cyber Express
by Ashish Khaitan
20h ago
Healthcare organizations are increasingly becoming prime targets for cyberattacks. The combination of limited budgets, a shortage of dedicated cybersecurity staff, and the sensitive nature of healthcare data creates a perfect storm for threat actors. For Chief Technology Officers (CTOs) in healthcare, understanding and implementing CTO best practices in healthcare threat intelligence is crucial to safeguarding patient data and ensuring the continuity of care. Healthcare remains one of the most targeted industries for cyberattacks. This trend is largely driven by the industry’s lower average s ..read more
Visit website

Follow The Cyber Express on FeedSpot

Continue with Google
Continue with Apple
OR