The Country Where You Live Impacts Password ChoicesLiteracy, levels of personal freedom, and other macro-social factors help determine how strong average passwords are in a given...
Month: September 2022
Why the US Should Help Secure Mexican Infrastructure — and What It Gets in Return
Why the US Should Help Secure Mexican Infrastructure — and What It Gets in ReturnCall it cross-border enlightened self-interest: As one of the US's premier trade...
Our Quest: Advancing Product Labels to Help Consumers Consider Cybersecurity
Our Quest: Advancing Product Labels to Help Consumers Consider CybersecurityFor many decades, consumers have relied on labels to help them make decisions about which products to...
Meta Takes Down Russian “Smash-and-Grab” Disinformation Campaign
Meta Takes Down Russian "Smash-and-Grab" Disinformation CampaignChinese network targeting US mid-terms also closed downLeer másChinese network targeting US mid-terms also closed down
Cyber-Threats Top Business Leaders’ Biggest Concerns
Cyber-Threats Top Business Leaders' Biggest ConcernsMany are operating under a false sense of securityLeer másMany are operating under a false sense of security
ICO Reprimands UK Organizations for GDPR Failings
ICO Reprimands UK Organizations for GDPR FailingsSubject Access Requests experiencing significant delaysLeer másSubject Access Requests experiencing significant delays
Hacker Breaches Fast Company Apple News Account, Sends Racist Messages
Hacker Breaches Fast Company Apple News Account, Sends Racist MessagesThe breach seems related to the hack of Fast Company's website on Sunday afternoonLeer másThe breach seems...
Hackers Use Telegram and Signal to Assist Protestors in Iran
Hackers Use Telegram and Signal to Assist Protestors in IranKey activities are data leaking and selling, including officials' phone numbers and emailsLeer másKey activities are data...
WatchGuard Report: Malware Decreases but Encrypted Malware Up in Q2 2022
WatchGuard Report: Malware Decreases but Encrypted Malware Up in Q2 2022This could reflect threat actors shifting their tactics to rely on more elusive malwareLeer másThis could...
IRS Warns of “Industrial Scale” Smishing Surge
IRS Warns of "Industrial Scale" Smishing SurgeTax agency says automated tools are to blameLeer másTax agency says automated tools are to blame
Crypto-Thieves Cost Victims 53 Times What They Make
Crypto-Thieves Cost Victims 53 Times What They MakeReport reveals surging cloud bills for crypto-jacking victimsLeer másReport reveals surging cloud bills for crypto-jacking victims
5 Network Security Threats And How To Protect Yourself
5 Network Security Threats And How To Protect YourselfCybersecurity today matters so much because of everyone's dependence on technology, from collaboration, communication and collecting data to...
Chinese Espionage Hackers Target Tibetans Using New LOWZERO Backdoor
Chinese Espionage Hackers Target Tibetans Using New LOWZERO BackdoorA China-aligned advanced persistent threat actor known as TA413 weaponized recently disclosed flaws in Sophos Firewall and Microsoft...
Researchers Identify 3 Hacktivist Groups Supporting Russian Interests
Researchers Identify 3 Hacktivist Groups Supporting Russian InterestsAt least three alleged hacktivist groups working in support of Russian interests are likely doing so in collaboration with...
North Korea’s Lazarus Hackers Targeting macOS Users Interested in Crypto Jobs
North Korea's Lazarus Hackers Targeting macOS Users Interested in Crypto JobsThe infamous Lazarus Group has continued its pattern of leveraging unsolicited job opportunities to deploy malware...
Hacker Behind Optus Breach Releases 10,200 Customer Records in Extortion Scheme
Hacker Behind Optus Breach Releases 10,200 Customer Records in Extortion SchemeThe Australian Federal Police (AFP) on Monday disclosed it's working to gather "crucial evidence" and that...
Experts Uncover 85 Apps with 13 Million Downloads Involved in Ad Fraud Scheme
Experts Uncover 85 Apps with 13 Million Downloads Involved in Ad Fraud SchemeAs many as 75 apps on Google Play and 10 on Apple App Store...
Why Continuous Security Testing is a Must for Organizations Today
Why Continuous Security Testing is a Must for Organizations TodayThe global cybersecurity market is flourishing. Experts at Gartner predict that the end-user spending for the information...
New NullMixer Malware Campaign Stealing Users’ Payment Data and Credentials
New NullMixer Malware Campaign Stealing Users' Payment Data and CredentialsCybercriminals are continuing to prey on users searching for cracked software by directing them to fraudulent websites...
Mobile, Cloud and Email Are Top Threat Vectors For 2023
Mobile, Cloud and Email Are Top Threat Vectors For 2023PwC study finds organizations have a long way to go on securityLeer másPwC study finds organizations have...
Ukraine Says Russia Planning Massive Cyberattacks on its Critical Infrastructures
Ukraine Says Russia Planning Massive Cyberattacks on its Critical InfrastructuresThe Ukrainian government on Monday warned of "massive cyberattacks" by Russia targeting critical infrastructure facilities located in...
Critical WhatsApp Bugs Could Have Let Attackers Hack Devices Remotely
Critical WhatsApp Bugs Could Have Let Attackers Hack Devices RemotelyWhatsApp has released security updates to address two flaws in its messaging app for Android and iOS that could...
Hackers Using PowerPoint Mouseover Trick to Infect System with Malware
Hackers Using PowerPoint Mouseover Trick to Infect System with MalwareThe Russian state-sponsored threat actor known as APT28 has been found leveraging a new code execution method that makes...
Facebook Shuts Down Covert Political ‘Influence Operations’ from Russia and China
Facebook Shuts Down Covert Political 'Influence Operations' from Russia and ChinaMeta Platforms on Tuesday disclosed it took steps to dismantle two covert influence operations originating from...
Cyber Criminals Using Quantum Builder Sold on Dark Web to Deliver Agent Tesla Malware
Cyber Criminals Using Quantum Builder Sold on Dark Web to Deliver Agent Tesla MalwareA recently discovered malware builder called Quantum Builder is being used to deliver...
Improve your security posture with Wazuh, a free and open source XDR
Improve your security posture with Wazuh, a free and open source XDROrganizations struggle to find ways to keep a good security posture. This is because it...
LeakBase: India Swachhata Platform Breached, 16 Million User PII Records Exposed
LeakBase: India Swachhata Platform Breached, 16 Million User PII Records ExposedData samples contain email addresses, hashed passwords and user IDs, other PIILeer másData samples contain email...
Researchers Warn of New Go-based Malware Targeting Windows and Linux Systems
Researchers Warn of New Go-based Malware Targeting Windows and Linux SystemsA new, multi-functional Go-based malware dubbed Chaos has been rapidly growing in volume in recent months to ensnare...
Five Steps to Mitigate the Risk of Credential Exposure
Five Steps to Mitigate the Risk of Credential ExposureEvery year, billions of credentials appear online, be it on the dark web, clear web, paste sites, or...
Hackers Aid Protests Against Iranian Government with Proxies, Leaks and Hacks
Hackers Aid Protests Against Iranian Government with Proxies, Leaks and HacksSeveral hacktivist groups are using Telegram and other tools to aid anti-government protests in Iran to...