Dridex Malware Now Attacking macOS Systems with Novel Infection MethodA variant of the infamous Dridex banking malware has set its sights on Apple's macOS operating system...
Day: January 13, 2023
Microsoft Reveals Tactics Used by 4 Ransomware Families Targeting macOS
Microsoft Reveals Tactics Used by 4 Ransomware Families Targeting macOSMicrosoft has shed light on four different ransomware families – KeRanger, FileCoder, MacRansom, and EvilQuest – that are...
Hackers Using CAPTCHA Bypass Tactics in Freejacking Campaign on GitHub
Hackers Using CAPTCHA Bypass Tactics in Freejacking Campaign on GitHubA South Africa-based threat actor known as Automated Libra has been observed employing CAPTCHA bypass techniques to...
Russian Turla Hackers Hijack Decade-Old Malware Infrastructure to Deploy New Backdoors
Russian Turla Hackers Hijack Decade-Old Malware Infrastructure to Deploy New BackdoorsThe Russian cyberespionage group known as Turla has been observed piggybacking on attack infrastructure used by...
Multiple Global Car Brands Discovered to Have API Vulnerabilities
Multiple Global Car Brands Discovered to Have API VulnerabilitiesConnected cars are a way of life for millions, but that also means they provide additional attack vectors...
USENIX Security ’22 – Theresa Stadler, Bristena Oprisanu, Carmela Troncoso – ‘Synthetic Data – Anonymisation Groundhog Day’
USENIX Security ’22 – Theresa Stadler, Bristena Oprisanu, Carmela Troncoso – ‘Synthetic Data – Anonymisation Groundhog Day’Our thanks to USENIX for publishing their Presenter’s USENIX Security...
Why You Need Continuous Password Monitoring for True Protection
Why You Need Continuous Password Monitoring for True ProtectionSome free password policy tools out there tout password protection without actively monitoring if user credentials become compromised...
Why These CAPTCHAs Don’t Work
Why These CAPTCHAs Don’t WorkWhy These CAPTCHAs Just Don’t Work Over the past four years, I’ve been the lead technical artist here at Arkose Labs. It...
Data Security: Your Ultimate Duty to Your Online Customer
Data Security: Your Ultimate Duty to Your Online CustomerRetail business leaders deal with many risks that threaten their businesses' economic stability and viability. And while physical...
ReversingLabs Threat Analysis and Hunting Solution January 2023 Update: Driving SecOps Forward
ReversingLabs Threat Analysis and Hunting Solution January 2023 Update: Driving SecOps Forward Learn how your organization can reduce cyber risks (as well as operational workload and...
Best Practices in Dependency Management: Cooking a Meal of Gourmet Code
Best Practices in Dependency Management: Cooking a Meal of Gourmet Code The post Best Practices in Dependency Management: Cooking a Meal of Gourmet Code appeared...
Tesla “Solar Factory” Implicated in FSD Fraud: Workers Directed to Classify Images for Driving
Tesla “Solar Factory” Implicated in FSD Fraud: Workers Directed to Classify Images for DrivingElon Musk launched the Tesla concept for chargers as solar powered. He promised...
Digital Trust Digest: This Week’s Must-Know News
Digital Trust Digest: This Week’s Must-Know NewsThe Digital Trust Digest is a curated overview of the week’s top cybersecurity news. Here's what happened the week of...
Step on It: What to Know About TISAX Compliance in the Automotive Market
Step on It: What to Know About TISAX Compliance in the Automotive MarketThe automotive industry is one of the largest in the world, with sales estimated...
5 Reasons to Consolidate Your Security Stack
5 Reasons to Consolidate Your Security StackHow SMEs Can Achieve Enterprise-Grade CybersecurityAlthough small to medium enterprises - SMEs - do not have the security resources larger...
Cloud email services bolster encryption against hackers
Cloud email services bolster encryption against hackersGoogle, Microsoft and Proton launched new end-to-end encryption products to confront the 50% increase in ransomware, phishing and other email-vector...
Darknet Markets Using Custom Android Apps for Fulfillment
Darknet Markets Using Custom Android Apps for FulfillmentM-Club Used by at Least 7 Drug-Focused Russian-Language Markets, Researchers ReportDarknet markets offering illegal drugs and fraudster tools and...
No more holidays for US telcos, FCC is cracking down
No more holidays for US telcos, FCC is cracking downAlso, LastPass faces class action, and Louisiana says that, while the internet may be for porn, ID...
How to configure an SMTP server in a self-hosted instance Passbolt
How to configure an SMTP server in a self-hosted instance PassboltWith the self-hosted Passbolt password manager, you must configure an SMTP server to use the collaboration...
US Flights Resume After Reported Computer Glitch Resolved
US Flights Resume After Reported Computer Glitch ResolvedSeparately, UK's Royal Mail Blames 'Cyber Incident' for Service DisruptionAnytime critical infrastructure gets disrupted, the first question inevitably seems...
Recent 2022 cyberattacks presage a rocky 2023
Recent 2022 cyberattacks presage a rocky 2023A spate of zero-day exploits against Twitter, Rackspace and others late last year showed the limits of a cybersecurity workforce...
Security risk assessment checklist
Security risk assessment checklistOrganizations, regardless of size, face ever-increasing information technology and data security threats. Everything from physical sites to data, applications, networks and systems are...
BCDR Buyer’s Guide For MSPs
BCDR Buyer’s Guide For MSPsWhen a client’s server goes down or is compromised in a cyberattack, managed service providers (MSPs) need an effective business continuity and...
Twitter: Latest Dump Has ‘Already Publicly Available’ Data
Twitter: Latest Dump Has 'Already Publicly Available' DataReports 'No Evidence' Twitter Flaw Exploited to Amass Latest Leaked Data on UsersTwitter says a massive collection of purported...
Twitter claims leaked data of 200M users not stolen from its systems
Twitter claims leaked data of 200M users not stolen from its systemsTwitter finally addressed reports that a dataset of email addresses linked to hundreds of millions of...
Business Continuity and Disaster Recovery Solutions Built For Managed Service Providers
Business Continuity and Disaster Recovery Solutions Built For Managed Service ProvidersCritical business data lives on servers, personal devices, and in the cloud. If any of that...
Scattered Spider hackers use old Intel driver to bypass security
Scattered Spider hackers use old Intel driver to bypass securityA financially motivated threat actor tracked as Scattered Spider was observed attempting to deploy Intel Ethernet diagnostics...
SIRIS Business Continuity and Disaster Recovery
SIRIS Business Continuity and Disaster RecoverySIRIS is fundamentally different than traditional backup and recovery solutions. Utilizing a cloud-first approach, managed service providers (MSPs) can offer their...
Fortinet: Govt networks targeted with now-patched SSL-VPN zero-day
Fortinet: Govt networks targeted with now-patched SSL-VPN zero-dayFortinet says unknown attackers exploited a FortiOS SSL-VPN zero-day vulnerability patched last month in attacks against government organizations and...
Exclusive: FDA Leader on Impact of New Medical Device Law
Exclusive: FDA Leader on Impact of New Medical Device LawThe $1.7 trillion omnibus spending bill signed into law last week by President Joe Biden contains new...