How to Remove Personal Information From Data Broker Sites Data brokers are companies that collect your information from a variety of sources to sell or license...
Month: August 2022
7 Signs Your Phone Has a Virus and What You Can Do
7 Signs Your Phone Has a Virus and What You Can Do Our phones store a lot of personal data, including contacts, social media account details,...
8 Signs It May Be Time for Parental Controls
8 Signs It May Be Time for Parental Controls Equipping and guiding your digitally connected child is one of the toughest challenges you will face as...
Here’s How to Steer Clear of Bot Accounts on Social Media
Here’s How to Steer Clear of Bot Accounts on Social Media “Congratulations, you’re a winner!” “Did you know this public figure is trying to make your...
Embrace change! Chris’s McAfee Journey
Embrace change! Chris’s McAfee Journey In this career-journey series, Internal Audit Manager Chris shares his recent journey joining the McAfee finance team and why he is...
K55354030: OpenJDK vulnerabilities CVE-2021-2341, CVE-2021-2369, CVE-2021-2388, CVE-2021-2432
K55354030: OpenJDK vulnerabilities CVE-2021-2341, CVE-2021-2369, CVE-2021-2388, CVE-2021-2432OpenJDK vulnerabilities CVE-2021-2341, CVE-2021-2369, CVE-2021-2388, CVE-2021-2432 Security Advisory Security Advisory Description CVE-2021-2341 Vulnerability in the Java SE, Oracle GraalVM ......
K80970653: BIG-IP iRules vulnerability CVE-2022-33962
K80970653: BIG-IP iRules vulnerability CVE-2022-33962BIG-IP iRules vulnerability CVE-2022-33962 Security Advisory Security Advisory Description The node iRules command may allow an attacker to bypass the access control...
Extending the Zero Trust Architecture Concept to APIs
Extending the Zero Trust Architecture Concept to APIsApplication programming interfaces (APIs) are critical to modern applications. APIs are used to communicate information between users and applications,...
Twilio Hackers Scarf 10K Okta Credentials in Sprawling Supply-Chain Attack
Twilio Hackers Scarf 10K Okta Credentials in Sprawling Supply-Chain AttackThe "0ktapus" cyberattackers set up a well-planned spear-phishing effort that affected at least 130 orgs beyond Twilio...
Nobelium APT uses new Post-Compromise malware MagicWeb
Nobelium APT uses new Post-Compromise malware MagicWebRussia-linked APT group Nobelium is behind a new sophisticated post-exploitation malware tracked by Microsoft as MagicWeb. Microsoft security researchers discovered...
LastPass data breach: threat actors stole a portion of source code
LastPass data breach: threat actors stole a portion of source codePassword management software firm LastPass has suffered a data breach, threat actors have stole source code...
0ktapus phishing campaign: Twilio hackers targeted other 136 organizations
0ktapus phishing campaign: Twilio hackers targeted other 136 organizationsThe threat actors behind Twilio and Cloudflare attacks have been linked to a phishing campaign that targeted other 136 organizations. The...
GoldDragon campaign: North-Korea linked Kimsuky APT adopts victim verification technique
GoldDragon campaign: North-Korea linked Kimsuky APT adopts victim verification techniqueThe North Korea-linked Kimsuky APT is behind a new campaign, tracked as GoldDragon, targeting political and diplomatic...
CISA Releases Guidelines to Aid Companies Transition to Post-quantum Cryptography
CISA Releases Guidelines to Aid Companies Transition to Post-quantum CryptographyThe guide provides overview of potential impacts of quantum computing on National Critical FunctionsLeer másThe guide provides...
Iran-linked Mercury APT exploited Log4Shell in SysAid Apps for initial access
Iran-linked Mercury APT exploited Log4Shell in SysAid Apps for initial accessAn Iran-linked Mercury APT group exploited the Log4Shell vulnerability in SysAid applications for initial access to...
Talos Renews Cybersecurity Support For Ukraine on Independence Day
Talos Renews Cybersecurity Support For Ukraine on Independence DayCisco and Talos both have resources available to organizations in Ukraine in need of assistanceLeer másCisco and Talos...
HavanaCrypt Ransomware Detection: New Ransomware Family Wreaks Havoc
HavanaCrypt Ransomware Detection: New Ransomware Family Wreaks Havoc A new ransomware package dubbed HavanaCrypt quickly catapulted into operation earlier this summer and has already caused a...
Microsoft Attributes New Post-Compromise Capability to Nobelium
Microsoft Attributes New Post-Compromise Capability to NobeliumMagicWeb improves on FoggyWeb by facilitating covert access directly via a malicious DLLLeer másMagicWeb improves on FoggyWeb by facilitating covert...
Critical flaw impacts Atlassian Bitbucket Server and Data Center
Critical flaw impacts Atlassian Bitbucket Server and Data CenterAtlassian addressed a critical vulnerability in Bitbucket Server and Data Center that could lead to malicious code execution on vulnerable...
LastPass Hackers Stole Source Code
LastPass Hackers Stole Source CodePassword management firm reveals incident in early AugustLeer másPassword management firm reveals incident in early August
Threat actor abuses Genshin Impact Anti-Cheat driver to disable antivirus
Threat actor abuses Genshin Impact Anti-Cheat driver to disable antivirusThreat actors abused a vulnerable anti-cheat driver for the Genshin Impact video game to disable antivirus software....
Block Faces Class Action Suit After 2021 Breach
Block Faces Class Action Suit After 2021 BreachPlaintiffs argue firm’s security posture was ineffectiveLeer másPlaintiffs argue firm’s security posture was ineffective
Weekly Update 310
Weekly Update 310By all accounts, this was one of the best weekly updates ever courtesy of a spam caller giving me a buzz at the 38:40...
Unprecedented cyber attack hit State Infrastructure of Montenegro
Unprecedented cyber attack hit State Infrastructure of MontenegroThe state Infrastructure of Montenegro was hit by a massive and “unprecedented” cyber attack, authorities announced. An unprecedented cyber...
Cosmetics Giant Sephora to Pay $1m+ Privacy Settlement
Cosmetics Giant Sephora to Pay $1m+ Privacy SettlementCalifornia’s data protection law bares its teethLeer másCalifornia’s data protection law bares its teeth
0ktapus Phishing Campaign Targets Okta Identity Credentials
0ktapus Phishing Campaign Targets Okta Identity CredentialsDespite using low-skill methods, the campaign compromised a large number of well-known companiesLeer másDespite using low-skill methods, the campaign compromised...
TeamTNT Targeted Cloud Instances and Containerized Environments For Two Years
TeamTNT Targeted Cloud Instances and Containerized Environments For Two YearsThe hacking group most likely originates from GermanyLeer másThe hacking group most likely originates from Germany
Iran-Based MuddyWater Targets Log4j 2 Vulnerabilities in SysAid Apps in Israel
Iran-Based MuddyWater Targets Log4j 2 Vulnerabilities in SysAid Apps in IsraelIt is the first campaign in which the hacker group exploits SysAid apps as a vector...
Apple flaws put company networks at risk
Apple flaws put company networks at risk Last week, Apple found two zero-day vulnerabilities in both iOS 15.6.1 and iPadOS 15.6.1 that hackers may have actively...
This Week in Malware – 450 Packages and a Phishing Campaign Against PyPI Maintainers
This Week in Malware – 450 Packages and a Phishing Campaign Against PyPI Maintainers This week in malware we discovered and analyzed 450 packages flagged as...





















