Why your data is more valuable than you may realizeThe data trail you leave behind whenever you're online is bigger – and more revealing – than...
Day: January 28, 2023
Black Basta Deploys PlugX Malware in USB Devices With New Technique
Black Basta Deploys PlugX Malware in USB Devices With New TechniqueThe variant is “wormable” and can infect USB devices to hide itself from the Windows OSLeer...
Multiple Vulnerabilities Found In Healthcare Software OpenEMR
Multiple Vulnerabilities Found In Healthcare Software OpenEMRTwo of these vulnerabilities combined could lead to unauthenticated remote code executionLeer másTwo of these vulnerabilities combined could lead to...
FBI takes down Hive ransomware group in an undercover operation
FBI takes down Hive ransomware group in an undercover operationThe US Department of Justice (DOJ) along with international partners has taken down the Hive ransomware group....
Kevin Mitnick Hacked California Law in 1983
Kevin Mitnick Hacked California Law in 1983Early in his career, Kevin Mitnick successfully hacked California law. He told me the story when he heard about my...
CBA AND FIDO: One, Other, or Both?
CBA AND FIDO: One, Other, or Both?Overview – A Pragmatic FIDO Approach There are a number of articles that discuss FIDO... The post CBA AND FIDO:...
There’s No There There….Or is There? You Won’t Find Out With DLP
There’s No There There….Or is There? You Won’t Find Out With DLPOver the past weeks, the discovery of classified documents in the homes of current, and...
3 Lifehacks While Analyzing Orcus RAT in a Malware Sandbox
3 Lifehacks While Analyzing Orcus RAT in a Malware SandboxOrcus is a Remote Access Trojan with some distinctive characteristics. The RAT allows attackers to create plugins and...
Hackers abuse legitimate remote monitoring and management tools in attacks
Hackers abuse legitimate remote monitoring and management tools in attacksSecurity researchers warn that an increasing number of attackers are using legitimate remote monitoring and management (RMM)...
Clarification of Obligations for the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates
Clarification of Obligations for the Use of Online Tracking Technologies by HIPAA Covered Entities and Business AssociatesThe Office for Civil Rights (OCR) within the U.S. Department...
Researchers Discover New PlugX Malware Variant Spreading via Removable USB Devices
Researchers Discover New PlugX Malware Variant Spreading via Removable USB DevicesCybersecurity researchers have uncovered a PlugX sample that employs sneaky methods to infect attached removable USB...
Experts Uncover the Identity of Mastermind Behind Golden Chickens Malware Service
Experts Uncover the Identity of Mastermind Behind Golden Chickens Malware ServiceCybersecurity researchers have discovered the real-world identity of the threat actor behind Golden Chickens malware-as-a-service, who goes by...
Ukraine Hit with New Golang-based ‘SwiftSlicer’ Wiper Malware in Latest Cyber Attack
Ukraine Hit with New Golang-based 'SwiftSlicer' Wiper Malware in Latest Cyber AttackUkraine has come under a fresh cyber onslaught from Russia that involved the deployment of...
Hive ransomware servers shut down at last, says FBI
Hive ransomware servers shut down at last, says FBIUnfortunately, you've probably already heard the cliche that "cybercrime abhors a vacuum"...Leer másNaked SecurityUnfortunately, you've probably already heard...
Dutch suspect locked up for alleged personal data megathefts
Dutch suspect locked up for alleged personal data megatheftsUndercover Austrian "controlled data buy" leads to Amsterdam arrest and ongoing investigation. Suspect is said to steal and...
ISC Releases Security Patches for New BIND DNS Software Vulnerabilities
ISC Releases Security Patches for New BIND DNS Software VulnerabilitiesThe Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the Berkeley Internet...














