Uncovering the link between PrivateLoader PPI service and RisePro stealerThe pay-per-install (PPI) malware downloader service PrivateLoader is being used to distribute the RisePro info-stealing malware. The pay-per-install...
Year: 2022
Facebook (Meta) to settle Cambridge Analytica data leak for $725M
Facebook (Meta) to settle Cambridge Analytica data leak for $725MFacebook (Meta) has agreed to pay $725 million to settle the class-action lawsuit filed in 2018 over...
Hackers stole $3 million worth of cryptocurrency from BTC.com
Hackers stole $3 million worth of cryptocurrency from BTC.comThe BTC.com cryptocurrency platform was the victim of a cyberattack that resulted in the theft of $3 million...
Zurich chief warned that cyber attacks will become uninsurable
Zurich chief warned that cyber attacks will become uninsurableThe chief executive of insurance giant Zurich warns that cyber attacks, rather than natural catastrophes, will become uninsurable....
Facebook to Pay $725 Million to Settle Lawsuit Over Data Leak
Facebook to Pay $725 Million to Settle Lawsuit Over Data LeakIn 2018, Meta Platforms, the parent company of Facebook, Instagram, and WhatsApp, settled a long-running class-action...
Dark Clouds Could Be Looming
Dark Clouds Could Be LoomingCyberattacks in the cloud are often overlooked and increasingly important By Bence Jendruszak, Co-Founder and COO, SEON Most […] The post Dark...
Fraud Prevention Tips for Online Businesses
Fraud Prevention Tips for Online BusinessesWell-implemented fraud prevention measures can ensure your business thrives today and is future proof for tomorrow. By Patrick […] The post...
Cryptocurrency Exchange BTC.com Suffers Massive Cyber Attack
Cryptocurrency Exchange BTC.com Suffers Massive Cyber AttackThe world’s largest cryptocurrency mining pool, BTC.com, announced it was the victim of a cyberattack that resulted in the theft...
Endpoint Security on the Edge
Endpoint Security on the EdgeBy Dan Richings, Senior Vice President Product Management, Adaptiva The average enterprise organization has thousands of endpoint devices, […] The post Endpoint...
Tips to Recover from a Data Center Failure
Tips to Recover from a Data Center FailureBy Zac Amos, Features Editor, ReHack Businesses must leverage various types of information as the world becomes increasingly […]...
IcedID Botnet Detection: Malvertising Attacks Abusing Google Pay-Per-Click (PPC) Ads
IcedID Botnet Detection: Malvertising Attacks Abusing Google Pay-Per-Click (PPC) Ads In late December 2022, cybersecurity researchers observed a new burst of malicious activity distributing the noteworthy...
Largest Data Breaches Of 2022 – Protect Data With Deep Packet Inspection
Largest Data Breaches Of 2022 – Protect Data With Deep Packet InspectionBy Randy Reiter CEO of Don’t Be Breached There were many massive Data Breaches in...
LastPass Breach
LastPass BreachLast August, LastPass reported a security breach, saying that no customer information—or passwords—were compromised. Turns out the full story is worse: While no customer data...
Arresting IT Administrators
Arresting IT AdministratorsThis is one way of ensuring that IT keeps up with patches: Albanian prosecutors on Wednesday asked for the house arrest of five public...
The most dangerous cyber security threats of 2023
The most dangerous cyber security threats of 2023The threat vectors cyber security experts believe will pose the biggest risk to cyber security in 2023Leer másArticles RSS...
FIN7 threat actor updated its ransomware activity
FIN7 threat actor updated its ransomware activityResearchers from PRODAFT reveal that the infamous FIN7 threat actor updated its ransomware activities and provide a unique view into...
Hacker claims to be selling Twitter data of 400 million users
Hacker claims to be selling Twitter data of 400 million usersA threat actor claims to be selling public and private data of 400 million Twitter users...
New info-stealer malware infects software pirates via fake cracks sites
New info-stealer malware infects software pirates via fake cracks sitesA new information-stealing malware named 'RisePro' is being distributed through fake cracks sites operated by the PrivateLoader...
EarSpy attack eavesdrops on Android phones via motion sensors
EarSpy attack eavesdrops on Android phones via motion sensorsA team of researchers has developed an eavesdropping attack for Android devices that can, to various degrees, recognize...
Hackers steal $8 million from users running trojanized BitKeep apps
Hackers steal $8 million from users running trojanized BitKeep appsMultiple BitKeep crypto wallet users reported that their wallets were emptied during Christmas after hackers triggered transactions...
BTC.com lost $3 million worth of cryptocurrency in cyberattack
BTC.com lost $3 million worth of cryptocurrency in cyberattackBTC.com, one of the world's largest cryptocurrency mining pools, announced it was the victim of a cyberattack that...
Cisco Firepower Management Center Software XML External Entity Injection Vulnerability
Cisco Firepower Management Center Software XML External Entity Injection VulnerabilityA vulnerability in the module import function of the administrative interface of Cisco Firepower Management Center (FMC)...
Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities
Cisco Firepower Management Center Software Cross-Site Scripting VulnerabilitiesMultiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote...
5 essentials for boards to drive cyber readiness
5 essentials for boards to drive cyber readinessCheck Point Software’s cyber security evangelist Ashwin Ram shares 5 essentials for boards that will help drive cyber readiness....
Cisco Firepower Management Center Software Information Disclosure Vulnerability
Cisco Firepower Management Center Software Information Disclosure VulnerabilityA vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote...
Cisco Firepower Management Center Software Command Injection Vulnerabilities
Cisco Firepower Management Center Software Command Injection VulnerabilitiesMultiple vulnerabilities in the web management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote...
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SNMP Denial of Service Vulnerability
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SNMP Denial of Service VulnerabilityA vulnerability in the Simple Network Management Protocol (SNMP) feature of Cisco...
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software VPN Authorization Bypass Vulnerability
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software VPN Authorization Bypass VulnerabilityA vulnerability in the authentication and authorization flows for VPN connections in Cisco...
Cisco Firepower Threat Defense Software SIP and Snort 3 Detection Engine Denial of Service Vulnerability
Cisco Firepower Threat Defense Software SIP and Snort 3 Detection Engine Denial of Service VulnerabilityA vulnerability in the interaction of SIP and Snort 3 for Cisco...
Cisco Firepower Threat Defense Software SSL Decryption Policy Bleichenbacher Attack Vulnerability
Cisco Firepower Threat Defense Software SSL Decryption Policy Bleichenbacher Attack VulnerabilityA vulnerability in the TLS handler of Cisco Firepower Threat Defense (FTD) Software could allow an...