Attackers use stolen banking data as phishing lure to deploy BitRATIn a case that highlights how attackers can leverage information from data breaches to enhance their...
Month: January 2023
Top tips for security‑ and privacy‑enhancing holiday gifts
Top tips for security‑ and privacy‑enhancing holiday giftsThink outside the (gift) box. Here are a few ideas for security and privacy gifts to get for your...
Quarter of UK SMBs Hit by Ransomware in 2022
Quarter of UK SMBs Hit by Ransomware in 2022War in Ukraine is making firms more anxiousLeer másWar in Ukraine is making firms more anxious
The BISO: bringing security to business and business to security
The BISO: bringing security to business and business to securityThroughout her career in IT security, Irina Singh has thrived on difficult projects. With a bachelor of science degree...
Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities
Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entitiesESET researchers discovered a spearphishing campaign targeting Japanese political entities a few weeks before the House of Councillors elections,...
Google Chrome ‘SymStealer’ Vulnerability Could Affect 2.5 Billion Users
Google Chrome 'SymStealer' Vulnerability Could Affect 2.5 Billion UsersThe warning comes from Imperva's security researcher Ron MasasLeer másThe warning comes from Imperva's security researcher Ron Masas
Cyber-Threat Actors Tailoring Attacks to Key Sectors
Cyber-Threat Actors Tailoring Attacks to Key SectorsDarktrace’s latest report analyses findings from the energy, retail and healthcare sectorsLeer másDarktrace’s latest report analyses findings from the energy,...
Traveling for the holidays? Stay cyber‑safe with these tips
Traveling for the holidays? Stay cyber‑safe with these tipsHoliday travel is back with a vengeance this year. Set yourself up for a cyber-safe and hassle-free trip...
Help! My kid has asked Santa for a smartphone
Help! My kid has asked Santa for a smartphoneThe time has come for your child to receive their first smartphone. Before handing it over, however, make...
NATO tests AI’s ability to protect critical infrastructure against cyberattacks
NATO tests AI’s ability to protect critical infrastructure against cyberattacksAutonomous intelligence, artificial intelligence (AI) that can act without human intervention, can help identify critical infrastructure cyberattack...
Telegram Bot Abuse For Phishing Increased By 800% in 2022
Telegram Bot Abuse For Phishing Increased By 800% in 2022The growth is associated with using HTML attachments as a delivery method in credential phishingLeer másThe growth...
The Guardian Confirms UK Staff Data Was Accessed in Ransomware Attack
The Guardian Confirms UK Staff Data Was Accessed in Ransomware AttackThe updates come from The Guardian's CEO Anna Bateson and its editor-in-chief Katharine VinerLeer másThe updates...
MirrorFace aims for high‑value targets in Japan – Week in security with Tony Anscombe
MirrorFace aims for high‑value targets in Japan – Week in security with Tony AnscombeThe group's proprietary backdoor LODEINFO delivers additional malware, exfiltrates credentials, and steals documents...
Millions of Insurance Customers Compromised Via Supplier
Millions of Insurance Customers Compromised Via SupplierAflac and Zurich reveal major breaches this weekLeer másAflac and Zurich reveal major breaches this week
How to set up parental controls on your child’s new smartphone
How to set up parental controls on your child’s new smartphoneGive yourself peace of mind and help create a safe online space for your child using...
Attackers create 130K fake accounts to abuse limited-time cloud computing resources
Attackers create 130K fake accounts to abuse limited-time cloud computing resourcesA group of attackers is running a cryptomining operation that leverages the free or trial-based cloud...
‘Tis the season for gaming: Keeping children safe (and parents sane)
‘Tis the season for gaming: Keeping children safe (and parents sane)It’s all fun and games over the holidays, but is your young gamer safe from the...
2022 in review: 10 of the year’s biggest cyberattacks
2022 in review: 10 of the year’s biggest cyberattacksThe past year has seen no shortage of disruptive cyberattacks – here’s a round-up of some of the...
Illegal Crypto Transaction Volumes Hit All-Time High
Illegal Crypto Transaction Volumes Hit All-Time HighSanctioned entities accounted for the largest volumeLeer másSanctioned entities accounted for the largest volume
Euro Police Bust Multimillion-Dollar Crypto Fraud Gang
Euro Police Bust Multimillion-Dollar Crypto Fraud GangCriminal network may have made hundreds of millions from scamsLeer másCriminal network may have made hundreds of millions from scams
Cybersecurity trends and challenges to look out for in 2023
Cybersecurity trends and challenges to look out for in 2023What are some of the key cybersecurity trends and themes that organizations should have on their radars...
Royal Mail’s Attackers Linked to Russia-Backed LockBit
Royal Mail's Attackers Linked to Russia-Backed LockBitThe ransomware gang allegedly used its latest encryptor, ‘Black,’ which borrows parts of the late Black Matter group’s encryptorLeer másThe...
Twitter’s mushrooming data breach crisis could prove costly
Twitter's mushrooming data breach crisis could prove costlySince Elon Musk purchased Twitter in late October, non-stop turmoil and controversy have dogged the company, from massive staff...
The world’s most common passwords: What to do if yours is on the list
The world’s most common passwords: What to do if yours is on the listDo you use any of these extremely popular – and eminently hackable –...
Gaming: How much is too much for our children?
Gaming: How much is too much for our children?With many children spending a little too much time playing video games, learn to spot the signs things...
14 UK schools suffer cyberattack, highly confidential documents leaked
14 UK schools suffer cyberattack, highly confidential documents leakedMore than a dozen schools in the UK have suffered a cyberattack which has led to highly confidential...
The doctor will see you now … virtually: Tips for a safe telehealth visit
The doctor will see you now … virtually: Tips for a safe telehealth visitAre your virtual doctor visits private and secure? Here’s what to know about,...
Ransomware target list – Week in security with Tony Anscombe
Ransomware target list – Week in security with Tony AnscombeWhy schools, hospitals, local governments and other public sector organizations are in a sweet spot for ransomware...
11 top XDR tools and how to evaluate them
11 top XDR tools and how to evaluate themLittle in the modern IT world lends itself to manual or siloed management, and this is doubly true...
Hybrid work: Turning business platforms into preferred social spaces
Hybrid work: Turning business platforms into preferred social spacesHybrid work and hybrid play now merge into hybrid living, but where is the line between the two?...