Google to Make Account Login Mandatory for New Fitbit Users in 2023Wearable technology company Fitbit has announced a new clause that requires users to switch to...
Month: September 2022
Scammers are most likely to pose as your friend — here’s why
Scammers are most likely to pose as your friend — here’s why I recently got a Facebook message that shook me. It was from an old...
BlackCat Ransomware Attackers Spotted Fine-Tuning Their Malware Arsenal
BlackCat Ransomware Attackers Spotted Fine-Tuning Their Malware ArsenalThe BlackCat ransomware crew has been spotted fine-tuning their malware arsenal to fly under the radar and expand their reach. "Among...
INKY Finds New Phishing Attack Technique Spoofing Netflix
INKY Finds New Phishing Attack Technique Spoofing Netflix A report published this week by INKY Technology, a provider of an email security platform, suggested cybercriminals have...
Uber and Rockstar – has a LAPSUS$ linchpin just been busted (again)?
Uber and Rockstar – has a LAPSUS$ linchpin just been busted (again)?Is this the same suspect as before? Is he part of LAPSUS$? Is this the...
NIST International Outreach Strengthened through Additional Translations and Engagement
NIST International Outreach Strengthened through Additional Translations and EngagementWith the update to the Cybersecurity Framework in full swing, NIST continues to prioritize international engagement through conversations...
Metador, a never-before-seen APT targeted ISPs and telco for about 2 years
Metador, a never-before-seen APT targeted ISPs and telco for about 2 yearsA previously undetected hacking group, tracked as Metador, has been targeting telecommunications, internet services providers...
Shikitega Malware Detection: Executes Multistage Infection Chain, Grants Full Control
Shikitega Malware Detection: Executes Multistage Infection Chain, Grants Full Control A new stealthy Linux malware named Shikitega is on the prowl for its victims. Its operators...
The Week in Ransomware – September 23rd 2022 – LockBit leak
The Week in Ransomware - September 23rd 2022 - LockBit leakThis week we saw some embarrassment for the LockBit ransomware operation when their programmer leaked a...
See how Pentera identifies and mitigates the risk of your most exploitable exposed credentials
See how Pentera identifies and mitigates the risk of your most exploitable exposed credentialsGraham Cluley Security News is sponsored this week by the folks at Pentera....
American Airlines learned it was breached from phishing targets
American Airlines learned it was breached from phishing targetsAmerican Airlines says its Cyber Security Response Team found out about a recently disclosed data breach from the targets...
Teen hacking suspect charged with computer misuse and breach of bail conditions
Teen hacking suspect charged with computer misuse and breach of bail conditionsCould the 16-year-old arrested in Oxford in March now be the 17-year-old arrested in Oxfordshire...
Leaking Passwords through the Spellchecker
Leaking Passwords through the SpellcheckerSometimes browser spellcheckers leak passwords: When using major web browsers like Chrome and Edge, your form data is transmitted to Google and...
Microsoft SQL servers hacked in TargetCompany ransomware attacks
Microsoft SQL servers hacked in TargetCompany ransomware attacksSecurity analysts at ASEC have discovered a new wave of attacks targeting vulnerable Microsoft SQL servers, involving the deployment...
8 mistakes CIOs make and how to avoid them
8 mistakes CIOs make and how to avoid themFrom driving transformative change, to sharing insights into the political nature of the role, IT leaders and advisors...
Windows 11 now warns when typing your password in Notepad, websites
Windows 11 now warns when typing your password in Notepad, websitesWindows 11 22H2 was just released, and with it comes a new security feature called Enhanced...
Optus data security breach: what should I do to protect myself?
Optus data security breach: what should I do to protect myself?Experts say while ‘there’s no need to panic’, there are steps you can take to ensure...
Optus faces potential class action and pledges free credit monitoring to data-breach customers
Optus faces potential class action and pledges free credit monitoring to data-breach customersHome affairs minister Clare O’Neil says company to blame and flags new laws with...
Threat Research: New Method of Volume Shadow Backup Deletion Seen in Recent Ransomware
Threat Research: New Method of Volume Shadow Backup Deletion Seen in Recent RansomwareVMware Threat Analysis Unit (TAU) researchers have recently observed a new technique for the...
The Evolution of the Chromeloader Malware
The Evolution of the Chromeloader MalwareExecutive Summary ChromeLoader proves to be an extremely prevalent and persistent malware. It initially drops as an .iso and can be...
Threat Report: Illuminating Volume Shadow Deletion
Threat Report: Illuminating Volume Shadow DeletionExecutive Summary Ransomware is one of the greatest threats to all industries. Threat actors have the ability to severely hinder, or...
Patch now! Microsoft issues critical security updates as PCs attacked through zero-day flaw
Patch now! Microsoft issues critical security updates as PCs attacked through zero-day flawWindows users are once again being told to update their systems with the latest...
Smashing Security podcast #289: Printer peeves, health data hangups, and Twitter tussles – with Rory Cellan-Jones
Smashing Security podcast #289: Printer peeves, health data hangups, and Twitter tussles – with Rory Cellan-JonesHow could your inkjet printer finally help you make some money,...
FBI warns of criminals attacking healthcare payment processors
FBI warns of criminals attacking healthcare payment processorsMillions of dollars have been stolen from healthcare companies after fraudsters gained access to customer accounts and redirected payments....
Uber’s hacker *irritated* his way into its network, stole internal documents
Uber’s hacker *irritated* his way into its network, stole internal documentsUber has suffered a security breach which allowed a hacker to break into its network, and...
5G Technology – Ensuring Cybersecurity for Businesses
5G Technology – Ensuring Cybersecurity for BusinessesBy Mohit Shrivastava, Chief Analyst ICT, Future Market Insights 5G network, the fifth generation of the cellular technology […] The...
Are Cyber Scams More Common and How Do We Avoid Them?
Are Cyber Scams More Common and How Do We Avoid Them?By Harry Turner, Freelance Writer Cyber scams seem to become more and more common and are...
Starbucks Singapore warns customers after hacker steals data, offers it for sale on underground forum
Starbucks Singapore warns customers after hacker steals data, offers it for sale on underground forum200,000 customers of Starbucks in Singapore have had their personal details put...
Hackers Exploited Zero-Day RCE Vulnerability in Sophos Firewall — Patch Released
Hackers Exploited Zero-Day RCE Vulnerability in Sophos Firewall — Patch ReleasedSecurity software company Sophos has released a patch update for its firewall product after it was...
Energy bill rebate scams spread via SMS and email
Energy bill rebate scams spread via SMS and emailThe UK’s National Cyber Security Centre (NCSC) has warned that fraudsters are sending out emails and SMS texts...





















