News
Latest breaking cybersecurity news
9 Business Leaders Share Barriers to Meeting Cybersecurity and Compliance Goals
Blog Cybersecurity and compliance are no longer optional in today’s interconnected digital landscape — they are essential for safeguarding...
Elevating Managed Security Services at MSSPAlertLive 2025
Blog MSSPAlertLive 2025, held on October 14th - 16th at the Hyatt Regency, Austin, TX, was a premier event that converged the managed...
TrustNet Wins “Editor’s Choice Best Compliance Advisory and Audit Firm” at the Top Infosec Innovator Awards 2024
Blog TrustNet, a leader in cybersecurity and compliance, has been honored with the esteemed Top Infosec Innovator 2024's "Editor's Choice...
HyperConnect 2024: TrustNet’s Insights
Blog HyperConnect 2024, hosted by Hyperproof, took place from September 16-18 at the Pendry Hotel in San Diego. The event gathered...
TrustNet is Named Finalist of the Coveted Top InfoSec Innovator Awards for 2024
Blog LAS VEGAS, NEVADA (CYBERDEFENSEWIRE) AUGUST 8, 2024 – TrustNet is proud to announce that during BlackHat USA 2024, we have been named...
Cybercriminals Are Getting Faster at Exploiting Vulnerabilities
The race continues over which side of cybersecurity will gain the upper hand in the next few years. There are some good news and a few alarming...
Microsoft Sounds Alarm on Ransomware Threats to Apple’s MacOS
Apple's macOS, known for its security features and stability, has long been considered a haven for users who want to keep their devices and data...
Drizly CEO Facing Unprecedented Sanctions for Data Privacy Violations
Online alcohol delivery service company, Drizly and its former CEO are facing a series of sanctions from the Federal Trade Commission (FTC) for...
Hack the Pentagon 3.0: Shifting Focus to Facility Control Systems
The Department of Defense's bug bounty program, known as Hack the Pentagon, is launching its third iteration. This time, it will focus on the...
Code-Injection Bugs Bite Google, Apache Open-Source GitHub Projects
Two of the most popular open-source ventures have identified several weaknesses, Google and Apache. The vulnerabilities may be used to access...
AICPA Updates SOC 2 Guidance: What’s Changed?
The AICPA has revised and updated the SOC 2 guidelines. There are no changes to the SOC 2 trust services criteria (commonly referred to as...
Corporate Employees Conned by Sneaky Stealers Using Fake Zoom Downloads
A new sneak attack is hitting the computer systems of corporate workers by redirecting users to fake download sites for popular productivity...
Trends and Predictions for Cybersecurity 2023
The field of cybersecurity is constantly evolving due to the rapid advancements in technology and the constantly changing threat of cybercrime. To...
ChatGPT: Cybersecurity Threat or Not Really?
Artificial intelligence (AI) has become commonplace in many aspects of our lives in recent years. We have...
Biden Administration to Release National Cyber Strategy
The Biden Administration is set to release a comprehensive National Cyber Strategy that will work to strengthen the security of our nation's digital...
Holiday Breaches and Scams 2022-2023
For most Americans, the holidays are full of shopping, festive candlelight dinners, and family gatherings. However, for some consumers, one number...
Notice of Recent Security Incident: LastPass
A security breach has been discovered within the LastPass password manager service. More information to come in the coming weeks. Keep your LastPass...
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Twilio and Cloudfare employees have seen targeted attacks against them in a much larger phishing campaign. The phishing campaign has successfully...
Python Developers are Targeted by WASP Stealer in an Ongoing Attack on Supply Chain
An ongoing supply chain attack has seen the spread of the W4SP Stealer virus. So far, the malicious Python packages have infected over 100 persons....
Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M Per Incident
Both large and medium-sized organizations need help to offset increasing data losses and a steep increase in downtime. As if this was not enough,...
Former Uber CISO Joe Sullivan Found Guilty Over Breach Cover-Up
Sullivan was arrested and charged with two felonies: obstruction of justice and misprision. During his tenure as Chief Security Officer (CSO) at...
Windows Mark of the Web Zero-Days Remain Patchless
Microsoft's Mark of the Web (MOTW) is a security feature that prevents malicious files and attachments from being downloaded or opened. However, two...
Are You Ready for the New ISO 27001:2022?
This year has seen the first significant update to ISO 27002 since 2013. These modifications reflect in Annex A's security controls for...
Effects of Cloud Complexities on Cybersecurity
Venafi, a company that makes artificial ID solutions, recently conducted a study to learn more about the effects of cloud complexities on...
VMware ESXi Hypervisors Vulnerable to a New and Deadly Attack Method
According to the security firm, a threat actor headquartered in China utilized tainted vSphere Installation Bundles to plant multiple backdoors in...
Capital One Phishing Attack Displays a Growing Trend in Bank-Brand Targeting
Phishers keep an eye on the news and use this knowledge to their advantage, as evidenced by the Capital One lures, which took advantage of the...
US Government Issues Guidance for Software Developers to Secure Software Supply Chain
Blog Enhancing the security of the software supply chain is just as important as ensuring that physical goods and components can move...
Student Loan Breach Exposes 2.5 Million Records
The Oklahoma Student Loan Authority (OSLA) and EdFinancial recently announced that over 2.5 million loanees were the victims of a severe data breach...
Microsoft Cloud Providers Move to Ban Basic Authentication
Flaws in the authentication process mean compromised security for businesses that contract with major cloud providers for services, data storage,...
Chrome Bug Allows Webpages to Replace Clipboard Contents
Browsers restrict webpages from accessing various forms of user data, and the user retains their right to share information with a website. However,...
Code-Injection Bugs Bite Google, Apache Open-Source GitHub Projects
Two of the most popular open-source ventures have identified several weaknesses, Google and Apache. The vulnerabilities may be used to access...
2022: Ransomware Attacks Are on the Rise
Cyberspace has enjoyed relative peace over the past few years due to a significant decline in ransomware attacks. This tranquility may be attributed...
Zero-Day Vulnerability Exploited to Hack Over 1,000 Zimbra Email Servers
Hackers use a zero-day vulnerability in Zimbra to inject a malicious payload onto vulnerable webmail servers using the PGP decryption exploit they...
Zeppelin Ransomware Resurfaces with New Compromise
A Zeus variant that first surfaced in August 2016 called Zeppelin has resurfaced and is now being used to compromise Web servers to distribute its...
DEF CON returns with “Hacker Homecoming”
Organizers of DEF CON, the world's largest hacker conference, have announced a date for its 20th anniversary in Las Vegas. The event took place from...
Sneaky Orbit Malware Backdoors Linux Devices
Researchers have discovered a devious malware for Linux: backdooring devices and stealing data. The malware can alter the overall functioning of any...
The U.S. Health Organizations Targeted With Maui Ransomware
North Korea's state-sponsored ransomware operators have launched a campaign targeting healthcare organizations in the United States. This is...
Vulnerabilities Found in Widely Used Robustel Industrial Routers
The Cisco Talos Threat Analytic and Research Unit has picked up several threats and vulnerabilities in the popularly used industrial cellular...
CISA Suggests That Organizations Use the Most Recent Version of Google Chrome
Blog Users and administrators should update to a new version of Chrome released by Google last week to address seven flaws in the...
Beware the ‘Secret Agent’ Cloud Middleware
Last Thursday, at RSA Conference in San Francisco, the researchers from Wiz.io unveiled an open-source cloud middleware database on GitHub that...
TrustNet Wins “Editor’s Choice in Managed Security Service Provider (MSSP)” at #RSAC 2022
Blog SAN FRANCISCO (BUSINESSWIRE) JUNE 6, 2022 – TrustNet is proud to announce we have won the following award from Cyber Defense Magazine...
Biometric Data Provides Increased Security, There Are Risk Factors
As the use of biometric data becomes more widespread, it is important to consider the potential risks associated with its use. While biometric data...
ChromeLoader Browser Hijacker Provides Gateway to Bigger Threats
Although ChromeLoader may appear to be a run-of-the-mill browser hijacker that merely reroutes users to advertising sites, its use of PowerShell...
Follina: A New Microsoft Zero-Day Attack is Now Underway
Worried about fraud, employers are shifting to authentication technologies that are both secure and user-friendly. But there's a catch. Adversaries...
Zyxel Firewall Bug is Active and Being Used After PoC Exploit Demo Debut
Zyxel firewalls are currently (as of May 2022) under a cyberattack after a critical security flaw was disclosed last week, allowing unauthenticated,...
‘Sysrv’ Botnet Targeting Recent Spring Cloud Gateway Vulnerability
Microsoft has discovered a new variant of the Sysrv botnet that includes a recent Spring Cloud Gateway vulnerability in its arsenal. Since at least...
Novel Phishing Trick: Unusual Links to Trick Spam Filters
Researchers have identified a never-before-seen method for sneaking malicious links into email inboxes. A novel form of phishing takes advantage of...
Log4j Attack Surface Remains Massive
Four months ago, the remote code execution hole exposed in the Apache Log4j logging tool still had a wide range of potential victims. Using the...
Defending Your Business Against Russian Cyber Warfare
As the West tightens its sanctions and supplies further assistance to Ukraine, we may anticipate Russian state-sponsored assaults to increase. The...
Former Uber Chief Security Officer To Face Wire Fraud Charges because of Failed Cybersecurity
Over the past few years, the road has not been smooth for former Uber Chief Security Officer Joseph Sullivan. On December 21, 2021, three additional...
NVIDIA Data Breach: Information on Employee Data Theft
Blog NVIDIA, famous for designing graphics processing units and integrated circuits, recently became the latest victim of a serious...
Nearly Two-Thirds of Ransomware Victims Paid Ransoms in 2021
Leading research and marketing firm CyberEdge Group, which serves companies in the cybersecurity industry, just published its ninth Cyberthreat...
New US Law to Require Cyber Incident Report
Cybersecurity concerns have gained even greater significance in the recent Russia-backed SolarWinds sabotage and the Ukrainian war. In response, the...
Multiple Security Flaws Discovered in Popular Software Package Managers
Recent security vulnerabilities in popular software package managers are raising concerns among digital safety experts. When these flaws compromise...
Mobile Threats Skyrocket
Although mobile devices are portable, powerful, and convenient, their use in employees' jobs is coming at a price. The very features that make them...
Hacked US Companies to Face New Reporting Requirements
When cybercriminals target sensitive data or charge companies or agencies a ransom to retrieve their encrypted information, the consequences can be...
High Severity WordPress Plugin Bug Hits Three Million
According to security experts, a popular WordPress plugin contains a bug that could compromise user data and even hijack vulnerable websites. The...
Security Concerns are Biggest Barrier to Cloud Adoption
The adoption of cloud-based services continues to accelerate. In fact, 97 percent of those surveyed in recent Confluera research indicated that...
More Organizations Suffered Phishing Attacks in 2021 Than in 2020
Thanks to intense media focus on the issue, the end-users of digital products should be much more aware of the dangers of data breaches....
Researchers Warn of New Log4Shell-Like Java Vulnerability
Security experts are driving our attention to the Log4Shell vulnerability in Java again. It has been around for several months. Although this new...
Google Docs Comments Exploit Allows for Distribution of Phishing and Malware
From students to corporate executives, workgroups of all types benefit from both Google Docs and the larger Google Workspace platforms. Due to the...
Patch Log4j Now or Risk Major Fines
Your information security vigilance can never be allowed to flag. Recently, the Federal Trade Commission underscored the importance of that point...
Growing Amount of Phishing Attacks During the Holiday Season
Along with the good cheer and gifts that are hallmarks of the holiday season comes a much less welcome phenomenon: phishing attacks. The vast...
TrustNet’s Response to Log4j Vulnerability CVE-2021-44228
On December 9, 2021, TrustNet security officials became aware of a vulnerability in the Log4j logging framework, CVE-2021-44228. Log4j is a...
TSA Requires Rail and Airports to Strengthen Cybersecurity
Earlier this year, a ransomware attack on the Colonial pipeline severely interrupted the country’s fuel distribution system. In response,...
U.S. Gov Announces Support for ‘Paris Call’ Cybersecurity Effort
On November 10, 2021, U.S. Vice President Kamala Harris re-established the nation's presence on the international stage by formally announcing the...
Zoom Patches High-Risk Flaws in Meeting Connector, Keybase Client Video Messaging
The use of video conferencing applications skyrocketed throughout the pandemic of 2020 and 2021. Although vendors such as Zoom were lifesavers for...
House Passes Two Bills to Improve Small Business Cybersecurity
The U.S. Congress recently passed two bills aimed at bolstering data security measures for small businesses. These pieces of legislation would...
Basic Security Lapses Pave the Way for Ransomware Attacks in 2021
On the surface, ransomware attacks seem sophisticated and complex. Seemingly out of nowhere, criminals gain access to a company's or institution's...
Sun Tzu’s ‘The Art of War’ Applied to Cybersecurity
In roughly the 5th century BC, the Chinese strategist Sun Tzu wrote a treatise that has long been one of the most famous military classics in the...
Shades of SolarWinds Attack Malware Found in New ‘Tomiris’ Backdoor
Just when it seemed like the furor around the supply attack on SolarWinds by a Russian-affiliated threat actor, Dark Halo had died down, sobering...
More than 90% of Q2 Malware Was Hidden in Encrypted Traffic
WatchGuard Technologies' latest quarterly Internet Security Report laid out the most pressing security trends and malware threats impacting the...
Data Breach Kicks U.S. Dental Patients in the Teeth
North American Dental Management is a company based in Pittsburgh responsible for providing administrative and technical support services to...
Banking Industry Hijacked by Ransomware Attacks in 2021
The headlines continue to buzz with news about ransomware attacks launched against educational institutions, hospitals, corporations, and banks. A...
Gaming Industry Under Attack
In December of 2020, after much fanfare, the CD Project Group launched Cyberpunk 2077. However, contrary to the hype, the game was riddled with bugs...
T-Mobile: 49 Million Customers Hit by Data Breach
In the era when smartphones have become indispensable in so many aspects of life, data breaches can be more devastating than ever before. The recent...
Email Security in the Post-COVID Workplace
The post-pandemic “new Normal” impacts all aspects of our lives, including the job site. Even when COVID was at its peak, collaboration among staff...
Data Leak in Fertility Clinic: Reasons & Consequences
Georgia-based fertility clinic Reproductive Biology Associates is one of the latest victims of the recent rash of ransomware attacks plaguing our...
Attackers Found New Ways to Exploit Google Docs
Google Docs can provide your organization with excellent tools to promote real-time collaboration among team members at different locations....