67K Customers Had Their Data Leaked in a Credential Stuffing Attack over DraftKings67,995 customers of the sports betting company DraftKings had their personal data exposed in...
Month: December 2022
New Microsoft Exchange Exploit Used by Ransomware Gang to Breach Servers
New Microsoft Exchange Exploit Used by Ransomware Gang to Breach ServersA group of threat actors known as Play ransomware is using a new exploit in Microsoft...
Ring Digital Cameras Used in a Widespread Police Prank
Ring Digital Cameras Used in a Widespread Police PrankThe US Department of Justice (DoJ) announced that two men were charged with hacking into Ring digital cameras...
What Is Identity Governance and Administration (IGA)?
What Is Identity Governance and Administration (IGA)?Identity Governance and Administration, also known as IGA in cybersecurity or identity security, is a strategic approach to security that...
Russian Hackers Targeted Petroleum Refinery in NATO Country
Russian Hackers Targeted Petroleum Refinery in NATO CountryDuring the ongoing Russo-Ukrainian conflict, the Russian-linked Gamaredon group attempted to break into a large petroleum refining company within...
Agenda Ransomware Steals Sensitive Data from Critical Infrastructure
Agenda Ransomware Steals Sensitive Data from Critical InfrastructureThis year, many ransomware-as-a-service groups, including Agenda and Qilin, have developed versions of their ransomware in Rust. Like its...
Raspberry Robin Worm Uses Fake Malware to Evade Detection
Raspberry Robin Worm Uses Fake Malware to Evade DetectionThreat actors started using fake malware to confuse researchers and avoid being analyzed by detection systems. The new...
Corsair Bug in Keyboard Causes Typing Without User’s Consent
Corsair Bug in Keyboard Causes Typing Without User’s ConsentA firmware bug in Corsair’s K100 keyboards, rather than malware, is causing previously entered text to be auto-typed...
BrandPost: Managing Risk Would be Easier if It Weren’t for People
BrandPost: Managing Risk Would be Easier if It Weren’t for PeopleBusinesses are as much at risk from human error as from threat actors. Typos, configuration errors,...
What Is System Hardening?
What Is System Hardening?In the cyber world, one of the most important things you can do is harden your system. System hardening is a key step...
Recently Discovered RisePro Malware Is a Vidar Stealer Derivative
Recently Discovered RisePro Malware Is a Vidar Stealer DerivativeRisePro, a new information-stealing malware, was recently observed on a dark web forum run by Russian cybercriminals. Since...
The Anatomy of Pharming and How to Prevent It
The Anatomy of Pharming and How to Prevent It‘Pharming’ is a type of cyberattack that uses malicious software to redirect traffic from a seemingly legitimate website...
GodFather, a New Android Banking Trojan
GodFather, a New Android Banking TrojanGodFather, a new Android banking trojan, is affecting over 400 banking and crypto apps and is active in 16 countries. The...
What Is Credential Management?
What Is Credential Management?If you’re responsible for keeping a high-profile organization or government institution with a large user base and workforce secure, your responsibilities are complicated....
Threat Actors Use Search Engine Ads for Ransomware and Phishing Attacks
Threat Actors Use Search Engine Ads for Ransomware and Phishing AttacksThreat actors use search engines to advertise websites that spread ransomware or steal login credentials. The...
Nation-state Hacking – What You Need to Know
Nation-state Hacking – What You Need to KnowNation-state actors operate at a higher level than regular cybercriminals, posing critical challenges to cybersecurity. Today we’ll explore their...
Social media use can put companies at risk: Here are some ways to mitigate the danger
Social media use can put companies at risk: Here are some ways to mitigate the dangerWe live in a social world, but should our businesses? For...
Organizations Warned of New Attack Vector in Amazon Web Services
Organizations Warned of New Attack Vector in Amazon Web ServicesResearchers warned that threat actors could potentially exploit Elastic IP transfer and compromise an IP addressLeer másResearchers...
Godfather Trojan Targets 400 Financial Services Firms
Godfather Trojan Targets 400 Financial Services FirmsMobile banking malware designed to steal bank and crypto credentialsLeer másMobile banking malware designed to steal bank and crypto credentials
UK Security Agency Wants Fresh Approach to Combat Phishing
UK Security Agency Wants Fresh Approach to Combat PhishingNCSC says "blame and fear" won’t workLeer másNCSC says "blame and fear" won’t work
Adult Google Ad Fraud Campaign Garnered Millions of Impressions
Adult Google Ad Fraud Campaign Garnered Millions of ImpressionsFraudster used "popunders" and obfuscation to generate cashLeer másFraudster used "popunders" and obfuscation to generate cash
Cyber-Incident Causes System Failures at Canadian Children’s Hospital
Cyber-Incident Causes System Failures at Canadian Children's HospitalThe ongoing incident has impacted clinical and corporate systems, as well as some hospital phone lines and webpagesLeer másThe...
US Most Impacted by Data Breaches in the Financial Industry in 2022
US Most Impacted by Data Breaches in the Financial Industry in 2022While 57% of these breaches were attributed to different types of malware, ATM skimming still...
Ransomware Attack Hits The Guardian Newspaper
Ransomware Attack Hits The Guardian NewspaperStaff told to work from home after compromiseLeer másStaff told to work from home after compromise
Researchers Develop AI-powered Malware Classification for 5G-enabled IIoT
Researchers Develop AI-powered Malware Classification for 5G-enabled IIoTA team of researchers came up with an ingenuous method leveraging AI to detect and classify malware in IIoT...
UK Government: Sharing Some Passwords is Illegal
UK Government: Sharing Some Passwords is IllegalIntellectual Property Office says it breaks copyright lawLeer másIntellectual Property Office says it breaks copyright law
BrandPost: The Next Big Attack Vector: Your Supply Chain
BrandPost: The Next Big Attack Vector: Your Supply ChainThere’s an old security adage: a chain is only as strong as its weakest link. The sentiment long...
FCC Proposes Massive $300m Fine for Robocall Firm
FCC Proposes Massive $300m Fine for Robocall FirmAuto-warranty campaign made billions of callsLeer másAuto-warranty campaign made billions of calls
An update on international data privacy protection
An update on international data privacy protection The 38 member countries of the Organization for Economic Cooperation and Development (OECD) have recently adopted a new international...
How to Use an HTTP Archive (HAR) With Mayhem
How to Use an HTTP Archive (HAR) With MayhemLearn how to fuzz an API without a specification by recording transactions with the API as an HTTP...



