Social media use can put companies at risk: Here are some ways to mitigate the dangerWe live in a social world, but should our businesses? For...
Day: December 22, 2022
Organizations Warned of New Attack Vector in Amazon Web Services
Organizations Warned of New Attack Vector in Amazon Web ServicesResearchers warned that threat actors could potentially exploit Elastic IP transfer and compromise an IP addressLeer másResearchers...
Godfather Trojan Targets 400 Financial Services Firms
Godfather Trojan Targets 400 Financial Services FirmsMobile banking malware designed to steal bank and crypto credentialsLeer másMobile banking malware designed to steal bank and crypto credentials
Adult Google Ad Fraud Campaign Garnered Millions of Impressions
Adult Google Ad Fraud Campaign Garnered Millions of ImpressionsFraudster used "popunders" and obfuscation to generate cashLeer másFraudster used "popunders" and obfuscation to generate cash
UK Security Agency Wants Fresh Approach to Combat Phishing
UK Security Agency Wants Fresh Approach to Combat PhishingNCSC says "blame and fear" won’t workLeer másNCSC says "blame and fear" won’t work
US Most Impacted by Data Breaches in the Financial Industry in 2022
US Most Impacted by Data Breaches in the Financial Industry in 2022While 57% of these breaches were attributed to different types of malware, ATM skimming still...
Cyber-Incident Causes System Failures at Canadian Children’s Hospital
Cyber-Incident Causes System Failures at Canadian Children's HospitalThe ongoing incident has impacted clinical and corporate systems, as well as some hospital phone lines and webpagesLeer másThe...
Researchers Develop AI-powered Malware Classification for 5G-enabled IIoT
Researchers Develop AI-powered Malware Classification for 5G-enabled IIoTA team of researchers came up with an ingenuous method leveraging AI to detect and classify malware in IIoT...
Ransomware Attack Hits The Guardian Newspaper
Ransomware Attack Hits The Guardian NewspaperStaff told to work from home after compromiseLeer másStaff told to work from home after compromise
BrandPost: The Next Big Attack Vector: Your Supply Chain
BrandPost: The Next Big Attack Vector: Your Supply ChainThere’s an old security adage: a chain is only as strong as its weakest link. The sentiment long...
UK Government: Sharing Some Passwords is Illegal
UK Government: Sharing Some Passwords is IllegalIntellectual Property Office says it breaks copyright lawLeer másIntellectual Property Office says it breaks copyright law
FCC Proposes Massive $300m Fine for Robocall Firm
FCC Proposes Massive $300m Fine for Robocall FirmAuto-warranty campaign made billions of callsLeer másAuto-warranty campaign made billions of calls
An update on international data privacy protection
An update on international data privacy protection The 38 member countries of the Organization for Economic Cooperation and Development (OECD) have recently adopted a new international...
How to Use an HTTP Archive (HAR) With Mayhem
How to Use an HTTP Archive (HAR) With MayhemLearn how to fuzz an API without a specification by recording transactions with the API as an HTTP...
Report Surfaces Top Vulnerabilities of 2022
Report Surfaces Top Vulnerabilities of 2022 Rezilion, a vulnerability management platform provider, shared a list of the top vulnerabilities discovered in 2022. The report suggested that...
Critical Microsoft Code-Execution Vulnerability
Critical Microsoft Code-Execution VulnerabilityA critical code-execution vulnerability in Microsoft Windows was patched in September. It seems that researchers just realized how serious it was (and is):...
Best of 2022: The Role of AI in Cybersecurity
Best of 2022: The Role of AI in CybersecurityIt’s clear that AI can be a powerful tool in the fight against cybercrime. By automating many of...
Infostealer Malware Threat Grows as MFA Fatigue Attacks Spread
Infostealer Malware Threat Grows as MFA Fatigue Attacks Spread Information stealer malware flourished on underground criminal networks in 2022, along with a rise in multifactor authentication...
Microsoft dishes the dirt on Apple’s “Achilles heel” shortly after fixing similar Windows bug
Microsoft dishes the dirt on Apple’s “Achilles heel” shortly after fixing similar Windows bugIt happens to the best of us: Microsoft highlights a security bypass bug...
“Suspicious login” scammers up their game – take care at Christmas
“Suspicious login” scammers up their game – take care at ChristmasA picture is worth 1024 words - we clicked through so you don't have to.Leer másNaked...