Weekly #cybersecurity digest to your inbox

Subscribe for our weekly digest and get each Friday the most important cyber security news, list of upcoming free webinars and a summary of Cyberday development to your inbox.
Thanks! See you in your inbox on Fridays. :)
Unfortunately something went wrong. You can contact us at team@cyberdayai.

Computer systems at University of Kentucky and UK HealthCare hobbled by massive, month-long cyber attack

Alex Acquisto reports: The University of Kentucky and UK HealthCare conducted a major reboot of their computer systems early...

Go to article at
15.5.2020
Malware

DOD contractor suffers ransomware infection

Virginia-based EWA has had systems infected with the Ryuk ransomware.

Go to article at
15.5.2020
Ransomware

Emotet Uses Coronavirus Scare to Infect Japanese Targets

A malspam campaign is actively distributing Emotet payloads via emails that warn the targets of Coronavirus infection reports in various prefectures from Japan, including Gifu, Osaka, and Tottori. [...]

Go to article at
15.5.2020
Malware

New Linux Vulnerability Lets Attackers Hijack VPN Connections

Security researchers found a new vulnerability allowing potential attackers to hijack VPN connections on affected *NIX devices and inject arbitrary data payloads into IPv4 and IPv6 TCP streams. [...]

Go to article at
15.5.2020
Unpatched Vulnerabilities

Email Server of Special Olympics of New York Hacked; Later Used To Launch a Phishing Campaign

Go to article at
15.5.2020
Phishing

Critical WordPress Bug Leaves 320,000 Sites Open to Attack

Authentication bypass bugs in WordPress plugins InfiniteWP Client and WP Time Capsule leave hundreds of thousands of sites open to attack.

Go to article at
15.5.2020
Unpatched Vulnerabilities

LabCorp Exposed Thousands Of Medical Documents

Go to article at
15.5.2020
Illegal Personal Data Processing

NetSupport Manager RAT Spread via Bogus NortonLifeLock Docs

The legitimate remote-access tool is being used to maliciously infect victims and allow remote code-execution.

Go to article at
15.5.2020
Malware

Most Ransomware Gets Executed Three Days After Initial Breach

Ransomware gets deployed three days after an organization's network gets infiltrated in the vast majority of attacks, with post-compromise deployment taking as long as 299 days in some of the dozens of attacks researchers at cybersecurity firm FireEye examined between 2017 and 2019. [...]

Go to article at
15.5.2020
Ransomware