Iranian Government Entities Under Attack by New Wave of BackdoorDiplomacy AttacksThe threat actor known as BackdoorDiplomacy has been linked to a new wave of attacks targeting Iranian government...
Month: January 2023
How passkeys are changing authentication
How passkeys are changing authenticationPasswords are a central aspect of security infrastructure and practice, but they are also a principal weakness involved in 81% of all...
Earth Bogle Campaign Unleashes NjRAT Trojan on Middle East and North Africa
Earth Bogle Campaign Unleashes NjRAT Trojan on Middle East and North AfricaAn ongoing campaign dubbed Earth Bogle is leveraging geopolitical-themed lures to deliver the NjRAT remote access trojan...
Skyhawk launches platform to provide threat detection and response across multi-cloud environments
Skyhawk launches platform to provide threat detection and response across multi-cloud environmentsCloud threat detection vendor Skyhawk Security has released a platform designed to address alert fatigue...
Mailchimp Suffers Another Security Breach Compromising Some Customers’ Information
Mailchimp Suffers Another Security Breach Compromising Some Customers' InformationPopular email marketing and newsletter service Mailchimp has disclosed yet another security breach that enabled threat actors to...
Bitzlato Crypto Exchange Founder Arrested for Aiding Cybercriminals
Bitzlato Crypto Exchange Founder Arrested for Aiding CybercriminalsThe U.S. Department of Justice (DoJ) on Wednesday announced the arrest of Anatoly Legkodymov (aka Gandalf and Tolik), the...
6 Types of Risk Assessment Methodologies + How to Choose
6 Types of Risk Assessment Methodologies + How to ChooseAn organization’s sensitive information is under constant threat. Identifying those security risks is critical to protecting that...
ServiceNow to detect open source security vulnerabilities with Snyk integration
ServiceNow to detect open source security vulnerabilities with Snyk integrationServiceNow Vulnerability Response users will now have access to Snyk Open Source, a software composition analysis (SCA) platform...
New Research Delves into the World of Malicious LNK Files and Hackers Behind Them
New Research Delves into the World of Malicious LNK Files and Hackers Behind ThemCybercriminals are increasingly leveraging malicious LNK files as an initial access method to...
FBI Confirms Lazarus Group Was Behind $100m Harmony Hack
FBI Confirms Lazarus Group Was Behind $100m Harmony HackThe North Korean cyber actors laundered over $60m worth of Ethereum stolen during the heistLeer másThe North Korean...
P-to-P fraud most concerning cyber threat in 2023: CSI
P-to-P fraud most concerning cyber threat in 2023: CSIUS financial institutions see peer-to-peer fraud and other digital fraud as the biggest cybersecurity concern in 2023. It...
DragonSpark Hackers Evade Detection With SparkRAT and Golang
DragonSpark Hackers Evade Detection With SparkRAT and GolangThe new string of attacks mostly targeted East Asian organizationsLeer másThe new string of attacks mostly targeted East Asian...
Android Users Beware: New Hook Malware with RAT Capabilities Emerges
Android Users Beware: New Hook Malware with RAT Capabilities EmergesThe threat actor behind the BlackRock and ERMAC Android banking trojans has unleashed yet another malware for rent called Hook that introduces new...
CYGNVS exits stealth, trumpeting its cyberattack recovery platform
CYGNVS exits stealth, trumpeting its cyberattack recovery platformCyber recovery startup CYGNVS announced its emergence from stealth today, having raised $55 million in series A funding and...
Just Half of Firms Have Sufficient Cybersecurity Budget
Just Half of Firms Have Sufficient Cybersecurity BudgetOne in 10 can only protect critical assets, says NeustarLeer másOne in 10 can only protect critical assets, says...
New Cheats May Emerge After Riot Games Hack
New Cheats May Emerge After Riot Games HackRansomware actors stole source code, company revealsLeer másRansomware actors stole source code, company reveals
Veterans bring high-value, real-life experience as potential cybersecurity employees
Veterans bring high-value, real-life experience as potential cybersecurity employeesJohanna Wood was an armored crewman with Lord Strathcona’s Horse, a Canadian Army regiment. At first glance, Wood’s...
New Microsoft Azure Vulnerability Uncovered — EmojiDeploy for RCE Attacks
New Microsoft Azure Vulnerability Uncovered — EmojiDeploy for RCE AttacksA new critical remote code execution (RCE) flaw discovered impacting multiple services related to Microsoft Azure could...
Regulator Stress Test Highlights Cyber Insurance Concerns
Regulator Stress Test Highlights Cyber Insurance ConcernsBank of England warns greater cross-industry consensus is neededLeer másBank of England warns greater cross-industry consensus is needed
Ticketmaster Claims Bot Attack Disrupted Taylor Swift Tour Sales
Ticketmaster Claims Bot Attack Disrupted Taylor Swift Tour SalesJoe Berchtold, president of Live Nation, made the claims at a congressional committee TuesdayLeer másJoe Berchtold, president of...
Yahoo Overtakes DHL As Most Impersonated Brand in Q4 2022
Yahoo Overtakes DHL As Most Impersonated Brand in Q4 2022DHL came in second place, with 16% of all brand phishing attempts, and Microsoft followed with 11%Leer...
APT group trojanizes Telegram app – Week in security with Tony Anscombe
APT group trojanizes Telegram app – Week in security with Tony AnscombeStrongPity's backdoor is fitted with various spying features and can record phone calls, collect texts,...
North Korean Group TA444 Shows ‘Startup’ Culture, Tries Numerous Infection Methods
North Korean Group TA444 Shows 'Startup' Culture, Tries Numerous Infection MethodsThe threat actor has been targeting cryptocurrency exchanges since at least 2017Leer másThe threat actor has...
Chinese Hackers Exploited Recent Fortinet Flaw as 0-Day to Drop Malware
Chinese Hackers Exploited Recent Fortinet Flaw as 0-Day to Drop MalwareA suspected China-nexus threat actor exploited a recently patched vulnerability in Fortinet FortiOS SSL-VPN as a...
Hybrid commerce: Blurring the lines between business and pleasure
Hybrid commerce: Blurring the lines between business and pleasureIt is now acceptable to find a job on a dating app! The post Hybrid commerce: Blurring the...
WhatsApp Hit with €5.5 Million Fine for Violating Data Protection Laws
WhatsApp Hit with €5.5 Million Fine for Violating Data Protection LawsThe Irish Data Protection Commission (DPC) on Thursday imposed fresh fines of €5.5 million against Meta's...
Chinese threat actor DragonSpark targets East Asian businesses
Chinese threat actor DragonSpark targets East Asian businessesOrganizations in Taiwan, Hong Kong, Singapore, and China have been recently facing attacks from Chinese threat actor DragonSpark. The...
Gamaredon Group Launches Cyberattacks Against Ukraine Using Telegram
Gamaredon Group Launches Cyberattacks Against Ukraine Using TelegramThe Russian state-sponsored cyber espionage group known as Gamaredon has continued its digital onslaught against Ukraine, with recent attacks...
Lloyds Bank Warns of 80% Surge in Advance Fee Scams
Lloyds Bank Warns of 80% Surge in Advance Fee ScamsFake ads for loans, jobs and properties are on the riseLeer másFake ads for loans, jobs and...
Roaming Mantis Spreading Mobile Malware That Hijacks Wi-Fi Routers’ DNS Settings
Roaming Mantis Spreading Mobile Malware That Hijacks Wi-Fi Routers' DNS SettingsThreat actors associated with the Roaming Mantis attack campaign have been observed delivering an updated variant...