Ransomware operators might be dropping file encryption in favor of corrupting filesRansomware started out many years as scams where users were being tricked into paying fictitious...
Year: 2022
The Increasing Insider Risk of Emerging Healthcare Technology
The Increasing Insider Risk of Emerging Healthcare TechnologyEarlier this month, the Health Sector Cybersecurity Coordination Center (HC3) issued a grave warning about the security implications of...
Sophos warns of a new actively exploited flaw in Firewall product
Sophos warns of a new actively exploited flaw in Firewall productSophos warns that a critical code injection security vulnerability in its Firewall product is actively exploited...
Weekly Update 313
Weekly Update 313I came so close to skipping this week's video. I'm surrounded by family, friends and my amazing wife to be in only a couple...
Hackers Deploy Malicious OAuth Apps to Compromise Email Servers, Spread Spam
Hackers Deploy Malicious OAuth Apps to Compromise Email Servers, Spread SpamThe spam emails were sent to trick recipients into signing up for fake paid subscriptionsLeer másThe...
A third of Australian population likely affected in Optus cyberattack
A third of Australian population likely affected in Optus cyberattackAustralia’s second largest telecommunications provider, Optus, revealed it suffered a cyberattack where data from customers have possibly...
Air Force Upgrades Digital Modernization Strategy to “As a Service” Model
Air Force Upgrades Digital Modernization Strategy to "As a Service" ModelThe transition will be carried out through three procurements to be awarded before the end of...
Hey WeLiveSecurity, how does biometric authentication work?
Hey WeLiveSecurity, how does biometric authentication work?Your eyes may be the window to your soul, but they can also be your airplane boarding pass or the...
Accused Russian RSOCKS Botmaster Arrested, Requests Extradition to U.S.
Accused Russian RSOCKS Botmaster Arrested, Requests Extradition to U.S.A 36-year-old Russian man recently identified by KrebsOnSecurity as the likely proprietor of the massive RSOCKS botnet has...
SEO poisoning campaign directs search engine visitors from multiple industries to JavaScript malware
SEO poisoning campaign directs search engine visitors from multiple industries to JavaScript malwareResearchers have discovered a high-effort search engine optimization (SEO) poisoning campaign that seems to...
IT Security Takeaways from the Wiseasy Hack
IT Security Takeaways from the Wiseasy HackLast month Tech Crunch reported that payment terminal manufacturer Wiseasy had been hacked. Although Wiseasy might not be well known in...
BSidesLV 2022 Lucky13 BreakingGround – Shreyas Rami’s, Shaun Jones’ ‘Ransomware Emulation Done Right’
BSidesLV 2022 Lucky13 BreakingGround – Shreyas Rami’s, Shaun Jones’ ‘Ransomware Emulation Done Right’Our sincere thanks to BSidesLV for publishing their outstanding conference videos on the organization's...
Researchers Disclose Critical Vulnerability in Oracle Cloud Infrastructure
Researchers Disclose Critical Vulnerability in Oracle Cloud InfrastructureResearchers have disclosed a new severe Oracle Cloud Infrastructure (OCI) vulnerability that could be exploited by users to access...
Researchers Uncover Years-Long Mobile Spyware Campaign Targeting Uyghurs
Researchers Uncover Years-Long Mobile Spyware Campaign Targeting UyghursA new wave of a mobile surveillance campaign has been observed targeting the Uyghur community as part of a...
StackHawk Expands API Security Testing Suite
StackHawk Expands API Security Testing Suite StackHawk this week expanded the scope of its application programming interface (API) security testing tools to now include the entire...
Malicious NPM Package Caught Mimicking Material Tailwind CSS Package
Malicious NPM Package Caught Mimicking Material Tailwind CSS PackageA malicious NPM package has been found masquerading as the legitimate software library for Material Tailwind, once again...
Firing Your Entire Cybersecurity Team? Are You Sure?
Firing Your Entire Cybersecurity Team? Are You Sure?What on earth were they thinking? That's what we – and other security experts – were wondering when content...
Void Balaur Hackers-for-Hire Targeting Russian Businesses and Politics Entities
Void Balaur Hackers-for-Hire Targeting Russian Businesses and Politics EntitiesA hack-for-hire group that was first exposed in 2019 has expanded its focus to set its sights on entities with...
Fake Indian Banking Rewards Apps Targeting Android Users with Info-stealing Malware
Fake Indian Banking Rewards Apps Targeting Android Users with Info-stealing MalwareAn SMS-based phishing campaign is targeting customers of Indian banks with information-stealing malware that masquerades as...
Hackers Using Malicious OAuth Apps to Take Over Email Servers
Hackers Using Malicious OAuth Apps to Take Over Email ServersMicrosoft on Thursday warned of a consumer-facing attack that made use of rogue OAuth applications deployed on...
Researchers Uncover New Metador APT Targeting Telcos, ISPs, and Universities
Researchers Uncover New Metador APT Targeting Telcos, ISPs, and UniversitiesA previously undocumented threat actor of unknown origin has been linked to attacks targeting telecom, internet service...
Morgan Stanley fined millions for selling off devices full of customer PII
Morgan Stanley fined millions for selling off devices full of customer PIICritical data on old disks always seems inaccessible if you really need it. But when...
CISA Warns of Hackers Exploiting Recent Zoho ManageEngine Vulnerability
CISA Warns of Hackers Exploiting Recent Zoho ManageEngine VulnerabilityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a recently disclosed security flaw in Zoho ManageEngine to...
S3 Ep101: Uber and LastPass breaches – is 2FA all it’s cracked up to be? [Audio + Text]
S3 Ep101: Uber and LastPass breaches – is 2FA all it’s cracked up to be? [Audio + Text]Latest episode - listen now! Learn why adopting 2FA...
Hackers Using Fake CircleCI Notifications to Hack GitHub Accounts
Hackers Using Fake CircleCI Notifications to Hack GitHub AccountsGitHub has put out an advisory detailing what may be an ongoing phishing campaign targeting its users to...
CNAPP buyers guide: Top tools compared
CNAPP buyers guide: Top tools comparedCloud security continues to be a vexing situation, and the tool set continues to become more complex, riddled with acronyms representing...
Q-Scout aims for smartphone security without the intrusiveness
Q-Scout aims for smartphone security without the intrusivenessMobile security firm Quokka—which earlier this week rebranded from its previous name, Kryptowire—is launching a new smartphone protection product...
Recommended security resources for Microsoft Active Directory
Recommended security resources for Microsoft Active DirectoryMany firms are still firmly in an Active Directory (AD) world. They may have moved some applications to the cloud,...
Iranian cyberspies use multi-persona impersonation in phishing threads
Iranian cyberspies use multi-persona impersonation in phishing threadsOne of the most prolific state-sponsored Iranian cyber espionage groups is targeting researchers from different fields by setting up...
One in 10 employees leaks sensitive company data every 6 months: report
One in 10 employees leaks sensitive company data every 6 months: reportInsider threats are an ongoing menace that enterprise security teams need to handle. It's a...




























