TikTok Denies Data Breach, Los Angeles School District Ransomware Attack, Fingerprint Scanners in School BathroomsTikTok has denied reports that it was breached by a hacking group,...
Year: 2022
Investigators Seize $30m in Stolen Crypto from North Korea
Investigators Seize $30m in Stolen Crypto from North KoreaFunds were taken in biggest ever digital currency heistLeer másFunds were taken in biggest ever digital currency heist
US Treasury sanctioned Iran ’s Ministry of Intelligence over Albania cyberattack
US Treasury sanctioned Iran ’s Ministry of Intelligence over Albania cyberattackThe U.S. Treasury Department sanctioned Iran ‘s Ministry of Intelligence and Security (MOIS) and its Minister...
$30 Million worth of cryptocurrency stolen by Lazarus from Axie Infinity was recovered
$30 Million worth of cryptocurrency stolen by Lazarus from Axie Infinity was recoveredUS authorities recovered more than $30 million worth of cryptocurrency stolen by the North...
Scammers live-streamed on YouTube a fake Apple crypto event
Scammers live-streamed on YouTube a fake Apple crypto eventScammers live-streamed on YouTube an old interview with Tim Cook as part of a fake Apple crypto event,...
The 12 biggest data breach fines, penalties, and settlements so far
The 12 biggest data breach fines, penalties, and settlements so farSizable fines assessed for data breaches since 2019 suggest that regulators are getting more serious about...
Hackers Compromise Employee Data at PVC-Maker Eurocell
Hackers Compromise Employee Data at PVC-Maker EurocellLaw firm is demanding more info from the companyLeer másLaw firm is demanding more info from the company
Buy Now Pay Later (BNPL): Prevent fraud using AML and KYC checks
Buy Now Pay Later (BNPL): Prevent fraud using AML and KYC checksBuy now and pay later (BNPL) services are the latest trend in the market, which...
China-Linked BRONZE PRESIDENT APT targets Government officials worldwide
China-Linked BRONZE PRESIDENT APT targets Government officials worldwideChina-linked BRONZE PRESIDENT group is targeting government officials in Europe, the Middle East, and South America with PlugX malware....
North Korean Lazarus Group Hacked Energy Providers Worldwide
North Korean Lazarus Group Hacked Energy Providers WorldwideThe campaign was disclosed by Symantec and AhnLab but Cisco Talos is now providing more detailsLeer másThe campaign was...
8 notable open-source security initiatives of 2022
8 notable open-source security initiatives of 2022Open-source security has been high on the agenda this year, with a number of initiatives, projects, and guidance launched in...
IHG suffered a cyberattack that severely impacted its booking process
IHG suffered a cyberattack that severely impacted its booking processInterContinental Hotels Group PLC (IHG) discloses a security breach, parts of its IT infrastructure has been subject...
Iran-linked APT42 is behind over 30 espionage attacks
Iran-linked APT42 is behind over 30 espionage attacksIran-linked APT42 (formerly UNC788) is suspected to be the actor behind over 30 cyber espionage attacks against activists and...
ICO Slams Government Departments Over FOI Failings
ICO Slams Government Departments Over FOI FailingsRegulator takes a harder line on enforcementLeer másRegulator takes a harder line on enforcement
Ransomware Actors Embrace Intermittent Encryption
Ransomware Actors Embrace Intermittent EncryptionNew technique makes for faster encryption and improved evasionLeer másNew technique makes for faster encryption and improved evasion
Security Affairs newsletter Round 383
Security Affairs newsletter Round 383A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in...
Cops Raid Suspected Fraudster Penthouses
Cops Raid Suspected Fraudster PenthousesGang believed to have posed as UK financial regulatorLeer másGang believed to have posed as UK financial regulator
Albania was hit by a new cyberattack and blames Iran
Albania was hit by a new cyberattack and blames IranAlbania blamed Iran for a new cyberattack that hit computer systems used by the state police on...
Cisco confirms that data leaked by the Yanluowang ransomware gang were stolen from its systems
Cisco confirms that data leaked by the Yanluowang ransomware gang were stolen from its systemsCisco confirmed the May attack and that the data leaked by the...
Some firmware bugs in HP business devices are yet to be fixed
Some firmware bugs in HP business devices are yet to be fixedSix high-severity firmware bugs affecting several HP Enterprise devices are yet to be patched, some...
Weekly Update 312
Weekly Update 312I'm so excited to see the book finally out and awesome feedback coming in, but I'm disappointed with this week's video. I frankly wasn't...
Triple Extortion Ransomware: A New Trend Among Cybercriminals
Triple Extortion Ransomware: A New Trend Among CybercriminalsEven though companies now understand the necessity of cybersecurity in the face of ransomware attacks, and started to take...
How Zero Trust and Secure Identities Can Help You Prevent Ransomware Attacks
How Zero Trust and Secure Identities Can Help You Prevent Ransomware AttacksBy Danna Bethlehem, Director Identity and Access Management (IAM), Thales With ransomware attacks on the...
Integrated Risk Modeling
Integrated Risk ModelingBetter Intel for Managing Risk By Andrew Beagley, Chief Risk Officer, OptimEyes.ai An Integrated Risk Modeling & Reporting […] The post Integrated Risk Modeling...
What is Crypto Malware and How to Defend Against Cryptojacking?
What is Crypto Malware and How to Defend Against Cryptojacking? Cryptocurrencies are trendy and associated with money, which doesn’t only attract investors but also makes them...
Our Quest: Advancing Product Labels to Help Consumers Consider Cybersecurity
Our Quest: Advancing Product Labels to Help Consumers Consider CybersecurityFor many decades, consumers have relied on labels to help them make decisions about which products to...
Ransomware gangs switching to new intermittent encryption tactic
Ransomware gangs switching to new intermittent encryption tacticA growing number of ransomware groups are adopting a new tactic that helps them encrypt their victims' systems faster while...
The risks of edge computing
The risks of edge computingEdge computing opens organizations up to some security risks, but they can be mitigated with the proper planning. The post The risks...
Firmware bugs in many HP computer models left unfixed for over a year
Firmware bugs in many HP computer models left unfixed for over a yearA set of six high-severity firmware vulnerabilities impacting a broad range of HP devices...
The rise of Linux malware: 9 tips for securing the OSS
The rise of Linux malware: 9 tips for securing the OSSJack Wallen ponders the rising tide of Linux malware and offers advice on how to help...




























