That 'clean' Google Translate app is actually Windows crypto-mining malwareAh, nothing like a classic Trojan horse Watch out: someone is spreading cryptocurrency-mining malware disguised as legitimate-looking...
Day: August 30, 2022
US Cyber Command and NSA Partner On Defence Efforts For Midterms Elections
US Cyber Command and NSA Partner On Defence Efforts For Midterms ElectionsThe group's main goal is to monitor foreign adversaries who may interfere with electionsLeer másThe...
Global Ransomware Damages to Exceed $30bn by 2023
Global Ransomware Damages to Exceed $30bn by 2023Six hundred malicious email campaigns made their way across the internet in the first half of 2022Leer másSix hundred...
UK Spies Fund New Course for Female Coders
UK Spies Fund New Course for Female CodersGCHQ wants to improve diversity for better resultsLeer másGCHQ wants to improve diversity for better results
FBI: Hackers Are Exploiting DeFi Bugs to Steal Funds
FBI: Hackers Are Exploiting DeFi Bugs to Steal FundsUsers of decentralized finance platforms at riskLeer másUsers of decentralized finance platforms at risk
New Go-based Ransomware ‘Agenda’ Delivers Customized Attacks
New Go-based Ransomware 'Agenda' Delivers Customized AttacksAgenda can reboot systems in safe mode and stop many server-specific processes and servicesLeer másAgenda can reboot systems in safe...
Google Launches Major Open Source Bug Bounty Program
Google Launches Major Open Source Bug Bounty ProgramInitiative is part of $10bn commitment to improve cybersecurityLeer másInitiative is part of $10bn commitment to improve cybersecurity
Nitrokod crypto miner infected systems across 11 countries since 2019
Nitrokod crypto miner infected systems across 11 countries since 2019Researchers spotted a Turkish-based crypto miner malware campaign, tracked as Nitrokod, which infected systems across 11 countries....
Twilio breach let attackers access Authy two-factor accounts of 93 users
Twilio breach let attackers access Authy two-factor accounts of 93 usersThreat actors behind the Twilio hack also gained access to the accounts of 93 individual users...
US FTC sued US data broker Kochava for selling sensitive and geolocation data
US FTC sued US data broker Kochava for selling sensitive and geolocation dataThe U.S. FTC sued US data broker Kochava for selling sensitive and precise geolocation...
World’s largest distributors of books Baker & Taylor hit by ransomware
World’s largest distributors of books Baker & Taylor hit by ransomwareBaker & Taylor, one of the world’s largest distributors of books, revealed that it was hit...
Crooks are increasingly targeting DeFi platforms to steal cryptocurrency
Crooks are increasingly targeting DeFi platforms to steal cryptocurrencyThe U.S. FBI warns investors that crooks are increasingly exploiting security issues in Decentralized Finance (DeFi) platforms to...
A study on malicious plugins in WordPress Marketplaces
A study on malicious plugins in WordPress MarketplacesA group of researchers from the Georgia Institute of Technology discovered malicious plugins on tens of thousands of WordPress...
LockBit Malware Group Threatens with Triple Extortion
LockBit Malware Group Threatens with Triple ExtortionLockBit ransomware gang – a ransomware operation that has been active for almost three years now listing over 700 victims...
Cryptocurrency Mining Campaign Goes Undetected Since 2019
Cryptocurrency Mining Campaign Goes Undetected Since 2019An ongoing cryptocurrency mining campaign that developed undetected since 2019 has been attributed to a Turkish-speaking agent called Nitrokod. The...
Collective Resilience in an Era of Data Traps, Digital Borders, and Techtonic Geopolitical Shifts
Collective Resilience in an Era of Data Traps, Digital Borders, and Techtonic Geopolitical ShiftsBy Andrea Little Limbago, SVP Research & Analysis, Interos The technological explosion of...
Content Anarchy: The Lurking Security Risk in A Digital-First World
Content Anarchy: The Lurking Security Risk in A Digital-First WorldBy Ellen Benaim, Chief Information Security Officer, Templafy More than two years since the onset of the...
Crisis Point
Crisis PointHow the skills shortage is threatening cyber security By Jamal Elmellas, COO, Focus-on-Security Finding sufficient talent has been […] The post Crisis Point appeared first...
What Is Malware? Malware Types to Watch Out For
What Is Malware? Malware Types to Watch Out For Malware stands for malicious software and denotes software that is designed to execute computer instructions that are...
Boots lets down its customers, by only offering SMS-based 2FA
Boots lets down its customers, by only offering SMS-based 2FAI must admit I was delighted to receive an email today from UK high street pharmacy Boots...
Levels of Assurance for DoD Microelectronics
Levels of Assurance for DoD MicroelectronicsThe NSA has has published criteria for evaluating levels of assurance required for DoD microelectronics. The introductory report in a DoD...
FTC Sues Data Broker
FTC Sues Data BrokerThis is good news: The Federal Trade Commission (FTC) has sued Kochava, a large location data provider, for allegedly selling data that the...
The truth about that draft law banning Uncle Sam buying insecure software
The truth about that draft law banning Uncle Sam buying insecure softwareThere's always a get-out clause An attempt by lawmakers to improve parts of the US...
Two years on, Apple iOS VPNs still leak IP addresses
Two years on, Apple iOS VPNs still leak IP addressesPrivacy, it's a useful marketing term. *Offer does not apply in China Apple has left a VPN...
Ex-HP finance manager jailed after going on $5m spending spree using company plastic
Ex-HP finance manager jailed after going on $5m spending spree using company plasticTesla sedan, 46 Chanel bags, 16 Rolexes, and more equals three years behind bars...
NSO Group CEO steps down, 100 employees let go too
NSO Group CEO steps down, 100 employees let go tooControversial Pegasus spyware maker to focus on NATO sales while battling various court cases Pegasus spyware slinger...
Zoom patches make-me-root security flaw, patches patch
Zoom patches make-me-root security flaw, patches patchPlus: See if in-app browsers are monitoring you, a novel industrial network attack technique, and more In brief Zoom fixed...
LockBit gang hit by DDoS attack after threatening to leak Entrust ransomware data
LockBit gang hit by DDoS attack after threatening to leak Entrust ransomware dataProlific group pummeled days after claiming to be file thief behind attack on cybersecurity...
Warning over Java libraries and deserialization security weaknesses
Warning over Java libraries and deserialization security weaknessesThere is a madness to the methods Boffins at universities in France, Germany, Luxembourg, and Sweden took a deep...
Hiding a phishing attack behind the AWS cloud
Hiding a phishing attack behind the AWS cloudScammers are using cloud services to create and host web pages that can be used to lure victims into...