Rising 'Firebrick Ostrich' BEC Group Launches Industrial-Scale CyberattacksThe group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low...
Day: February 4, 2023
Iran crew stole Charlie Hebdo database, says Microsoft
Iran crew stole Charlie Hebdo database, says MicrosoftSame gang pestered US voters during 2020 presidential election Microsoft believes the gang who boasted it had stolen and...
Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks
Rising 'Firebrick Ostrich' BEC Group Launches Industrial-Scale CyberattacksThe group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low...
Guy accused of wrecking crypto exchange now hauled into court
Guy accused of wrecking crypto exchange now hauled into courtMango Markets still offline for now ... but v4 comeback release looms The man accused of bringing...
Fast-evolving Prilex POS malware can block contactless payments
Fast-evolving Prilex POS malware can block contactless payments... forcing users to insert their cards into less-secure PIN systems The reasons businesses and consumers like contactless payment...
HeadCrab bots pinch 1,000+ Redis servers to mine coins
HeadCrab bots pinch 1,000+ Redis servers to mine coinsWe devoting full time to floating under /etc A sneaky botnet dubbed HeadCrab that uses bespoke malware to...
Cyber Insurer Sees Remote Access, Cloud Databases Under Fire
Cyber Insurer Sees Remote Access, Cloud Databases Under FireReminder: Real-World Attacks Often Focus on Small Subset of Known VulnerabilitiesCriminals lately have been prioritizing two types of...
Indian Official Highlights Djvu Ransomware as Threat
Indian Official Highlights Djvu Ransomware as ThreatDjvu Camouflages Itself as Cracked SoftwareAn Indian cybersecurity official highlighted Djvu ransomware as a threat, saying that "maximum companies" are...
IBM Security GM on Seeing a Target Through the Hacker’s Eyes
IBM Security GM on Seeing a Target Through the Hacker's EyesMary O'Brien on How External Attack Surface Management Finds Internet-Facing IssuesCompanies can be blinded by their...
Hackers Posing as Ukrainian Ministry Deploy Info Stealers
Hackers Posing as Ukrainian Ministry Deploy Info StealersSpoofed Polish Police Websites Also FoundUkrainian and Polish cyber defenders are warning against a slew of phishing websites that...
CrowdStrike CEO on Why It’s Tough to Defend Sensitive Assets
CrowdStrike CEO on Why It's Tough to Defend Sensitive AssetsGeorge Kurtz on How Reposify Helps Customers Locate and Safeguard Priority AssetsOrganizations today struggle with both new...
¿Es segura tu estación de carga EV? Nuevas vulnerabilidades de seguridad descubiertas
¿Es segura tu estación de carga EV? Nuevas vulnerabilidades de seguridad descubiertasDos nuevas debilidades de seguridad descubiertas en varios sistemas de carga de vehículos eléctricos (EV)...
Nuevas vulnerabilidades de alta gravedad descubiertas en los productos Cisco IOx y F5 BIG-IP
Nuevas vulnerabilidades de alta gravedad descubiertas en los productos Cisco IOx y F5 BIG-IPF5 advirtió sobre una falla de alta gravedad que afecta a los dispositivos...