Multiple Campaigns Exploit VMware Vulnerability to Deploy Crypto Miners and RansomwareA now-patched vulnerability in VMware Workspace ONE Access has been observed being exploited to deliver both...
Year: 2022
CISA Warns of Daixin Team Hackers Targeting Health Organizations With Ransomware
CISA Warns of Daixin Team Hackers Targeting Health Organizations With RansomwareU.S. cybersecurity and intelligence agencies have published a joint advisory warning of attacks perpetrated by a...
Why Ransomware in Education on the Rise and What That Means for 2023
Why Ransomware in Education on the Rise and What That Means for 2023The breach of LA Unified School District (LAUSD) highlights the prevalence of password vulnerabilities,...
10 common Zelle scams – and how to avoid them
10 common Zelle scams – and how to avoid themFraudsters use various tactics to separate people from their hard-earned cash on Zelle. Here’s how to keep...
Heat left by users’ fingertips could help hackers crack passwords, researchers claim
Heat left by users’ fingertips could help hackers crack passwords, researchers claimBoffins at the University of Glasgow, in Scotland, have developed a system which they claim...
Critical Flaw Reported in Move Virtual Machine Powering the Aptos Blockchain Network
Critical Flaw Reported in Move Virtual Machine Powering the Aptos Blockchain NetworkResearchers have disclosed details about a now-patched critical flaw in the Move virtual machine that...
Download eBook: Top virtual CISOs share 7 tips for vCISO service providers
Download eBook: Top virtual CISOs share 7 tips for vCISO service providersVirtual Chief Information Security Officer (vCISO) services (also known as 'Fractional CISO' or 'CISO-as-a-Service') are...
SideWinder APT Using New WarHawk Backdoor to Target Entities in Pakistan
SideWinder APT Using New WarHawk Backdoor to Target Entities in PakistanSideWinder, a prolific nation-state actor mainly known for targeting Pakistan military entities, compromised the official website...
Kolide, endpoint security for teams that want to meet SOC 2 compliance goals without sacrificing privacy
Kolide, endpoint security for teams that want to meet SOC 2 compliance goals without sacrificing privacyGraham Cluley Security News is sponsored this week by the folks...
Life in pursuit of answers: In the words of Ada Yonath
Life in pursuit of answers: In the words of Ada YonathFrom a little girl financially helping her family in Jerusalem to a Nobel Prize laureate. That is...
Apple Releases Patch for New Actively Exploited iOS and iPadOS Zero-Day Vulnerability
Apple Releases Patch for New Actively Exploited iOS and iPadOS Zero-Day VulnerabilityTech giant Apple on Monday rolled out updates to remediate a zero-day flaw in iOS...
Water Labbu Abuses Malicious DApps to Steal Cryptocurrency
Water Labbu Abuses Malicious DApps to Steal CryptocurrencyThe parasitic Water Labbu capitalizes on the social engineering schemes of other scammers, injecting malicious JavaScript code into their...
Why Palo Alto Networks Now Wants Cider Security, Not Apiiro
Why Palo Alto Networks Now Wants Cider Security, Not ApiiroPalo Alto in Talks to Buy Cider for $200M, Walks Away From $600M Apiiro DealPalo Alto Networks...
Ukrainian Governmental Agencies Targeted by Ransomware Attacks
Ukrainian Governmental Agencies Targeted by Ransomware AttacksAn alert has been issued by the Computer Emergency Response Team of Ukraine (CERT-UA) on October 21st regarding Cuba Ransomware...
ESET research into POLONIUM’s arsenal – Week in security with Tony Anscombe
ESET research into POLONIUM’s arsenal – Week in security with Tony AnscombeMore than a dozen organizations operating in various verticals were attacked by the threat actor...
5 steps to protect your school from cyberattacks
5 steps to protect your school from cyberattacksWhat can schools, which all too often make easy prey for cybercriminals, do to bolster their defenses and keep...
Why Cybereason Went From IPO Candidate to Seeking a Buyer
Why Cybereason Went From IPO Candidate to Seeking a BuyerStiff Competition, Muddled Go-to-Market Strategy Put Cybereason on Path to SellingCybereason has abandoned its IPO plans altogether...
Fine for Shein! Fashion site hit with $1.9 million bill after lying about data breach
Fine for Shein! Fashion site hit with $1.9 million bill after lying about data breachThe parent company of women's fashion site Shein has been fined $1.9...
Emotet Botnet Drops Malware via Self-Unlocking Password-Protected RAR Files
Emotet Botnet Drops Malware via Self-Unlocking Password-Protected RAR FilesA surge of malspam campaigns has been recently attributed to Emotet botnet. Taking advantage of password-protected archive files, the notorious...
Don’t get scammed when buying tickets online
Don’t get scammed when buying tickets onlineWith hot-ticket events firmly back on the agenda, scammers selling fake tickets online have also come out in force The...
Smashing Security podcast #294: The Virgin trains swindler, cyber clowns, and AirTag election debacle
Smashing Security podcast #294: The Virgin trains swindler, cyber clowns, and AirTag election debacleSomeone's election-fiddling is uncovered with an Apple AirTag, a cyber scandal rocks Germany,...
Tracking Earth Aughisky’s Malware and Changes
Tracking Earth Aughisky’s Malware and ChangesFor over 10 years, security researchers have been observing and keeping tabs of APT group Earth Aughisky’s malware families and the...
Domestic Kitten campaign spying on Iranian citizens with new FurBall malware
Domestic Kitten campaign spying on Iranian citizens with new FurBall malwareAPT-C-50’s Domestic Kitten campaign continues, targeting Iranian citizens with a new version of the FurBall malware...
APT‑C‑50 updates FurBall Android malware – Week in security with Tony Anscombe
APT‑C‑50 updates FurBall Android malware – Week in security with Tony AnscombeESET Research spots a new version of Android malware known as FurBall that APT-C-50 is...
Akamai to boost network-layer DDoS protection with new scrubbing centers
Akamai to boost network-layer DDoS protection with new scrubbing centersContent delivery network (CDN) provider Akamai said Tuesday that its Prolexic DDoS protection service will become able...
Microsoft “BlueBleed” data breach: customer details and email content exposed
Microsoft “BlueBleed” data breach: customer details and email content exposedMicrosoft says that it accidentally exposed sensitive customer data after failing to configure a server securely. But...
Australia’s Data Breach Wave: Workaday Cybercrime
Australia's Data Breach Wave: Workaday CybercrimeNation-State Actors Aren't Going to Be as Obnoxious and PublicIs Australia's data breach wave a coincidence, bad luck or intentional targeting?...
WhatsApp Down: Users Can’t Send or Receive Messages
WhatsApp Down: Users Can’t Send or Receive MessagesToday, October 25th, WhatsApp, the biggest messaging app in the world, suffered from an outage that shut down its...
5 reasons to keep your software and devices up to date
5 reasons to keep your software and devices up to dateNext time you're tempted to hold off on installing software updates, remember why these updates are...
The Interpol Metaverse Was Launched to Help the Fight against Cybercrime
The Interpol Metaverse Was Launched to Help the Fight against CybercrimeLast week, at the 90th Interpol General Assembly in New Delhi, The International Criminal Police Organization...




























