Sophos Firewall v21.5: Streamlined management
How to make the most of the new features in Sophos Firewall v21.5.
Matt Wilson reports: The city of Mission expects the fallout from a debilitating ransomware attack last month to have an impact for months. The city said so in correspondence last Thursday seeking an attorney general’s opinion allowing it to withhold contracts with outside cybersecurity experts and legal council asked for by the Progress Times through…
Mallika Sheshadri reports: Kokomo Solutions, a technology vendor that provides Los Angeles Unified School District students with telehealth services and a tip line to report suspicious activity, has fallen prey to a data breach. The company noticed “unusual activity on our computer network” on Dec. 11, 2024 — but did not file a data breach notice with the……
A sprawling operation undertaken by global law enforcement agencies and a consortium of private sector firms has disrupted the online infrastructure associated with a commodity information stealer known as Lumma (aka LummaC or LummaC2), seizing 2,300 domains that acted as the command-and-control (C2) backbone to commandeer infected Windows systems. “Malware like LummaC2 is deployed to…
Suzanne Smalley reports: A hacktivist with a “political agenda” broke into Columbia University IT systems and stole “targeted” student data in recent weeks, a university official said Tuesday. It is unclear how long the hacker was in university systems but a Columbia spokesperson said there has been no threat activity detected since June 24. Last…
Bill Toulas reports: Google has observed hackers claiming to be the ShinyHunters extortion group conducting social engineering attacks against multi-national companies to steal data from organizations’ Salesforce platforms. According to Google’s Threat Intelligence Group (GTIG), which tracks the threat cluster as ‘UNC6040,’ the attacks target English-speaking employees with voice phishing attacks to trick them into…
Both human and machine identities occupy a unique position: they are simultaneously the foundation of cybersecurity and its weakest link. The post Cyber Insights 2025: Identities appeared first on SecurityWeek.