Malwarebytes blocks Google, YouTube as malwareSounds like fair comment Updated Google and its Youtube domains are being flagged as malicious by Malwarebytes as of Wednesday morning,...
Day: September 27, 2022
San Francisco cops can use private cameras to live-monitor ‘significant events’
San Francisco cops can use private cameras to live-monitor 'significant events'All eyes on you, and you, and you San Francisco police are now set to use...
Alert: 15-year-old Python tarfile flaw lurks in ‘over 350,000’ code projects
Alert: 15-year-old Python tarfile flaw lurks in 'over 350,000' code projectsOh cool, a 5,500-day security hole At least 350,000 open source projects are believed to be...
Fake sites fool Zoom users into downloading deadly code
Fake sites fool Zoom users into downloading deadly codeAh, the human touch Beware the Zoom site you don't recognize, as a criminal gang is creating multiple...
Cambodian authorities crack down on cyber slavery amid international pressure
Cambodian authorities crack down on cyber slavery amid international pressureLured by fake jobs, victims are isolated abroad and forced to carry out crypto and romance scams,...
Check out this Android spyware, says Microsoft, the home of a gazillion Windows flaws
Check out this Android spyware, says Microsoft, the home of a gazillion Windows flawsWhile issuing an emergency patch for Endpoint Configuration Manager Data-stealing spyware disguised as...
Privacy watchdog steps up fight against Europol’s hoarding of personal data
Privacy watchdog steps up fight against Europol's hoarding of personal dataIf you could stop storing records on people unconnected to any crimes, that would be great...
Iran blocks Whatsapp, Instagram as citizens protest death of Mahsa Amini
Iran blocks Whatsapp, Instagram as citizens protest death of Mahsa AminiAlso: New 'magnet of threats' attackers and FBI has details on Iran's online incursion into Albania...
Significant customer data exposed in attack on Australian telco
Significant customer data exposed in attack on Australian telcoSubscribers have questions – like 'When were you going to tell us?' Updated Australian telecommunications company Optus has...
Open up, it’s the IRS. We’re here about the crypto tax you dodged
Open up, it's the IRS. We're here about the crypto tax you dodged'At least ten' people didn't declare coin income. Wow, what a bust The IRS...
Noberus ransomware gets info-stealing upgrades, targets Veeam backup software
Noberus ransomware gets info-stealing upgrades, targets Veeam backup software'One of the most dangerous and active malware developers operating at the moment' Crooks spreading the Noberus ransomware...
India seeks verified IDs to register email accounts
India seeks verified IDs to register email accountsPLUS: Warnings on Chinese payment schemes; AWS brushes up its Cantonese; Hong Kong ponders digital dollar; and more! Asia...
An expert guide to securing APIs
An expert guide to securing APIsHow Web Application and API Protection (WAAP) can help you sleep at night Webinar The application programming interface (API) has been...
How do you run rings around ransomware?
How do you run rings around ransomware?Build data resilience in the cloud first Webinar It's critical to protect data from infection or exposure to ransomware. The...
SQL Server admins warned about Fargo ransomware
SQL Server admins warned about Fargo ransomwareFrom small town in North Dakota with a crime problem to file-scrambling nasty Organizations are being warned about a wave...
Ukraine fears ‘massive’ Russian cyberattacks on power, infrastructure
Ukraine fears 'massive' Russian cyberattacks on power, infrastructureWill those be before or after the nuke strikes Putin keeps banging on about? Russia plans to conduct "massive...
China’s infosec researchers obeyed Beijing and stopped reporting vulns … or did they?
China's infosec researchers obeyed Beijing and stopped reporting vulns ... or did they?Report finds increase in anonymous vuln reports The number of vulnerability reports provided by...
Microsoft bets on hardware/software duo for Win11 security
Microsoft bets on hardware/software duo for Win11 securityBut you'll need to buy lots of new hardware to get the benefit Analysis As it rolled out the...
NSA and CISA: What To Do When Hackers Target Critical Systems
NSA and CISA: What To Do When Hackers Target Critical SystemsThe National Security Agency (NSA) together with the Cybersecurity and Infrastructure Agency (CISA) have issued an...
Data Corruption, A Potential New Trend in Ransomware Attacks
Data Corruption, A Potential New Trend in Ransomware AttacksExmatter, a well-known data exfiltration malware used by the BlackMatter ransomware group, has been spotted operating a new...
Adware Found in 75 Apps on Google Play and App Store
Adware Found in 75 Apps on Google Play and App StoreIn a recent investigation, security researchers have discovered 75 applications on Google Play and other ten...
Erbium, A New InfoStealer Malware on the Market
Erbium, A New InfoStealer Malware on the MarketErbium is a new Malware-as-a-Service (MaaS) designed to steal login credentials and cryptocurrency wallets. The Malware circulates at the...
Lorenz Ransomware Detection: The Group Leverages CVE-2022-29499 Vulnerability in Mitel VoIP Devices
Lorenz Ransomware Detection: The Group Leverages CVE-2022-29499 Vulnerability in Mitel VoIP Devices The Lorenz security threat group has been targeting corporate networks across the U.S., China,...
Check out this Android spyware, says Microsoft, the home of a gazillion Windows flaws
Check out this Android spyware, says Microsoft, the home of a gazillion Windows flawsWhile issuing an emergency patch for Endpoint Configuration Manager Data-stealing spyware disguised as...
Fake sites fool Zoom users into downloading deadly code
Fake sites fool Zoom users into downloading deadly codeAh, the human touch Beware the Zoom site you don't recognize, as a criminal gang is creating multiple...
What Is Data Exfiltration? MITRE ATT&CK® Exfiltration Tactic | TA0010
What Is Data Exfiltration? MITRE ATT&CK® Exfiltration Tactic | TA0010 The process of stealing data from a corporate system is also known as exfiltration. MITRE ATT&CK®...
Uber Breach 2022: Detect the Destructive Cyber-Attack Causing the Complete Organization’s System Takeover
Uber Breach 2022: Detect the Destructive Cyber-Attack Causing the Complete Organization’s System Takeover On September 15, Uber officially confirmed an attack resulting in an organization-wide cybersecurity...
Privacy watchdog steps up fight against Europol’s hoarding of personal data
Privacy watchdog steps up fight against Europol's hoarding of personal dataIf you could stop storing records on people unconnected to any crimes, that would be great...
TeamTNT Hijacking Servers: Criminal Gang Specializing in Attacking Cloud Environments is Back
TeamTNT Hijacking Servers: Criminal Gang Specializing in Attacking Cloud Environments is Back Honeypot activity spotted by one of the cybersecurity vendors confirmed that the cryptojacking TeamTNT...
Shikitega Malware Detection: Executes Multistage Infection Chain, Grants Full Control
Shikitega Malware Detection: Executes Multistage Infection Chain, Grants Full Control A new stealthy Linux malware named Shikitega is on the prowl for its victims. Its operators...