Twenty years on, command-line virus scanner ClamAV puts out version 1Used by millions – and the first official finished version The ClamAV command-line virus scanner used...
Day: December 1, 2022
S3 Ep110: Spotlight on cyberthreats – an expert speaks [Audio + Text]
S3 Ep110: Spotlight on cyberthreats – an expert speaks [Audio + Text]Latest episode - security expert John Shier explains what the real-life cybercrime stories in the...
Voice-scamming site “iSpoof” seized, 100s arrested in massive crackdown
Voice-scamming site “iSpoof” seized, 100s arrested in massive crackdownThose numbers or names that pop up when a call comes up? They're OK as a hint of...
Lastpass discloses the second security breach this year
Lastpass discloses the second security breach this yearLastPass disclosed a new security breach, threat actors had access to its cloud storage using information stolen in the...
Chrome fixes 8th zero-day of 2022 – check your version now (Edge too!)
Chrome fixes 8th zero-day of 2022 – check your version now (Edge too!)There isn't a rhyme to remind you which months have browser zero-days... you just...
Serious Security: MD5 considered harmful – to the tune of $600,000
Serious Security: MD5 considered harmful – to the tune of $600,000It's not just the hashing, by the way. It's the salting and the stretching, too!Leer másNaked...
Google Accuses Spanish Spyware Vendor of Exploiting Chrome, Firefox, and Windows Zero-Days
Google Accuses Spanish Spyware Vendor of Exploiting Chrome, Firefox, and Windows Zero-DaysA Barcelona-based surveillanceware vendor named Variston IT is said to have surreptitiously planted spyware on...
TikTok “Invisible Challenge” porn malware puts us all at risk
TikTok “Invisible Challenge” porn malware puts us all at riskAn injury to one is an injury to all. Especially if the other people are part of...
Healthcare Breaches Expose Sensitive Information; Twitter Users’ Data Leaked Online
Healthcare Breaches Expose Sensitive Information; Twitter Users’ Data Leaked OnlineThe end of the year is upon us. You’ll soon begin to see plenty of articles recapping...
Intruders gain access to user data in LastPass incident
Intruders gain access to user data in LastPass incidentPassword manager working to identify info affected but says credentials are safely encrypted Intruders broke into a third-party...
Lastpass says hackers accessed customer data in new breach
Lastpass says hackers accessed customer data in new breachLastPass says unknown attackers breached its cloud storage using information stolen during a previous security incident from August 2022....
North Korea ScarCruft APT used previously undetected Dolphin Backdoor against South Korea
North Korea ScarCruft APT used previously undetected Dolphin Backdoor against South KoreaNorth Korea-linked ScarCruft group used a previously undocumented backdoor called Dolphin against targets in South Korea. ESET researchers discovered...
3 of the Worst Data Breaches in the World That Could Have Been Prevented
3 of the Worst Data Breaches in the World That Could Have Been PreventedData breaches can be devastating for organizations, these are 3 of the worst...
Flaw allowed man to access private information of other Brinks Home Security customers
Flaw allowed man to access private information of other Brinks Home Security customersA Canadian man has revealed that the company he chose to provide security for...
Critical RCE bugs in Android remote keyboard apps with 2M installs
Critical RCE bugs in Android remote keyboard apps with 2M installsThree Android applications that allow users to use devices as remote keyboards for their computers have...
Twitter isn’t going to stop people posting COVID-19 misinformation anymore
Twitter isn’t going to stop people posting COVID-19 misinformation anymoreAs of September 2022, Twitter had challenged 11.72 million accounts, suspended 11,230 accounts, and removed over 97,674...
Sigma Rules Bot for Threat Bounty
Sigma Rules Bot for Threat Bounty How to Create, Test & Have Your Sigma Rules Published to SOC Prime’s Platform via Slack SOC Prime has recently...
SOC Prime Platform Now Supports the MITRE ATT&CK® Framework v12
SOC Prime Platform Now Supports the MITRE ATT&CK® Framework v12 MITRE ATT&CK is a globally-accessible knowledge base leveraged by all cyber defenders no matter their role...
Zero-Day Exploit Prices for Signal Messaging App Are Skyrocketing
Zero-Day Exploit Prices for Signal Messaging App Are SkyrocketingOpZero, a new exploit broker company based in Petersburg, Russia, tripled Zerodium’s offer for an eventual Signal RCE...
The OWASP Top 10 – How Akamai Helps
The OWASP Top 10 – How Akamai HelpsOWASP publishes a list of the 10 most common vulnerabilities in web applications. This white paper details how Akamai...
Introduction to Remote Spectrum Monitoring
Introduction to Remote Spectrum MonitoringSpectrum Monitoring for Critical Infrastructure By Brandon Malatest, Per Vices Corporation As wireless communications break its expansion banks, […] The post Introduction...
Keralty ransomware attack impacts Colombia’s health care system
Keralty ransomware attack impacts Colombia's health care systemThe Keralty multinational healthcare organization suffered a RansomHouse ransomware attack on Sunday, disrupting the websites and operations of the...
Emotet Detection: Infamous Botnet Resurfaces to the Email Threat Landscape
Emotet Detection: Infamous Botnet Resurfaces to the Email Threat Landscape Cybersecurity researchers have observed a burst of the new malicious activity of the Emotet botnet, which...
Smashing Security podcast #300: Interplanetary file systems, iSpoof, and don’t delete Twitter
Smashing Security podcast #300: Interplanetary file systems, iSpoof, and don’t delete TwitterWhy deleting your Twitter account may be a very bad idea, how the police unravelled...
Facebook Fined $276M under GDPR
Facebook Fined $276M under GDPRFacebook—Meta—was just fined $276 million (USD) for a data leak that included full names, birth dates, phone numbers, and location. Meta’s total...
How Akamai Helps to Mitigate the OWASP API Security Top 10 Vulnerabilities
How Akamai Helps to Mitigate the OWASP API Security Top 10 VulnerabilitiesExperts warn that API attacks will soon become the most common type of web application...
Sirius XM Software Vulnerability
Sirius XM Software VulnerabilityThis is new: Newly revealed research shows that a number of major car brands, including Honda, Nissan, Infiniti, and Acura, were affected by...
What is Account Takeover and How to Prevent It in 2022
What is Account Takeover and How to Prevent It in 2022An account takeover (ATO), in which criminals impersonate legitimate account owners to take control of an...
GoTo says hackers breached its dev environment, cloud storage
GoTo says hackers breached its dev environment, cloud storageRemote access and collaboration company GoTo disclosed today that they suffered a security breach where threat actors gained...
Industry 4.0: CNC Machine Security Risks Part 1
Industry 4.0: CNC Machine Security Risks Part 1This three-part blog series explores the risks associated with CNC machinesLeer másTrend Micro Research, News, PerspectivesThis three-part blog series...