⚡Top Cybersecurity News Stories This Week — Cybersecurity NewsletterHey ? there, cyber friends! Welcome to this week's cybersecurity newsletter, where we aim to keep you informed and...
Day: February 23, 2023
Experts Warn of RambleOn Android Malware Targeting South Korean Journalists
Experts Warn of RambleOn Android Malware Targeting South Korean JournalistsSuspected North Korean nation-state actors targeted a journalist in South Korea with a malware-laced Android app as...
GoDaddy Discloses Multi-Year Security Breach Causing Malware Installations and Source Code Theft
GoDaddy Discloses Multi-Year Security Breach Causing Malware Installations and Source Code TheftWeb hosting services provider GoDaddy on Friday disclosed a multi-year security breach that enabled unknown...
Twitter Limits SMS-Based 2-Factor Authentication to Blue Subscribers Only
Twitter Limits SMS-Based 2-Factor Authentication to Blue Subscribers OnlyTwitter has announced that it's limiting the use of SMS-based two-factor authentication (2FA) to its Blue subscribers. "While...
Fortinet Issues Patches for 40 Flaws Affecting FortiWeb, FortiOS, FortiNAC, and FortiProxy
Fortinet Issues Patches for 40 Flaws Affecting FortiWeb, FortiOS, FortiNAC, and FortiProxyFortinet has released security updates to address 40 vulnerabilities in its software lineup, including FortiWeb, FortiOS, FortiNAC,...
Samsung Introduces New Feature to Protect Users from Zero-Click Malware Attacks
Samsung Introduces New Feature to Protect Users from Zero-Click Malware AttacksSamsung has announced a new feature called Message Guard that comes with safeguards to protect users...
Google Reveals Alarming Surge in Russian Cyber Attacks Against Ukraine
Google Reveals Alarming Surge in Russian Cyber Attacks Against UkraineRussia's cyber attacks against Ukraine surged by 250% in 2022 when compared to two years ago, Google's...
Cyber Espionage Group Earth Kitsune Deploys WhiskerSpy Backdoor in Latest Attacks
Cyber Espionage Group Earth Kitsune Deploys WhiskerSpy Backdoor in Latest AttacksThe cyber espionage threat actor tracked as Earth Kitsune has been observed deploying a new backdoor called WhiskerSpy...
How to Detect New Threats via Suspicious Activities
How to Detect New Threats via Suspicious ActivitiesUnknown malware presents a significant cybersecurity threat and can cause serious damage to organizations and individuals alike. When left...
Reddit admits it was hacked and data stolen, says “Don’t panic”
Reddit admits it was hacked and data stolen, says “Don’t panic”Reddit is suggesting three tips as a follow-up to this breach. We agree with two of...
Acunetix improves default roles
Acunetix improves default rolesA new Acunetix Premium update has been released for Windows and Linux: 15.4 This Acunetix release improves the default roles. Acunetix offers role-based access...
The Top 10 Cybersecurity Dashboard Metrics Every CIO Needs to Know
The Top 10 Cybersecurity Dashboard Metrics Every CIO Needs to Know As cybersecurity continues to become a more significant focus for organizations, other C-suite leaders must...
Escaping well-configured VSCode extensions (for profit)
Escaping well-configured VSCode extensions (for profit)By Vasco Franco In part one of this two-part series, we escaped Webviews in real-world misconfigured VSCode extensions. But can we...
Weak Creds, Unpatched Flaws, Reliance on Tools Plagued Orgs in 2022
Weak Creds, Unpatched Flaws, Reliance on Tools Plagued Orgs in 2022 Organizations often either have weak credential policies or don’t enforce them, making it easy for...
Can’t Stay PCI Compliant? Consider a PCI Charter
Can’t Stay PCI Compliant? Consider a PCI Charter Does this sound familiar? You’ve gotten your Report on Compliance (RoC), but you’re dreading the next assessment because...
How to Create a GDPR Data Protection Policy
How to Create a GDPR Data Protection PolicyIn this blog, we will discuss what GDPR compliance entails and provide tips on how to create an effective...
SLSA and Developer Productivity Meet in 2023
SLSA and Developer Productivity Meet in 2023 As cyberattacks rise, software organizations must proactively reduce vulnerabilities and ‘shift left’ to harden their entire software delivery life...
VPN Alternatives
VPN AlternativesIs there a better option than VPN? Virtual Private Networks (VPN) have been widely used as a solution for secure remote access for decades. However,...
Do Hardened Systems Need FIM?
Do Hardened Systems Need FIM? In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine, Robert E. Johnson III, Cimcor CEO/President, addresses whether...
The Top 5 Ways to Secure Your Snowflake Environment
The Top 5 Ways to Secure Your Snowflake Environment The world is increasingly built on data. An estimated 120 zettabytes will be created, captured, copied, and...
Trust, not tech, is holding back a safer internet
Trust, not tech, is holding back a safer internetExcuse me, citizen, did you packet this data yourself? Opinion The tech sector is failing at cybersecurity. Global...
Here’s a list of proxy IPs to help block KillNet’s DDoS bots
Here's a list of proxy IPs to help block KillNet's DDoS botsPut pro-Putin bots on the do not call list A free tool aims is helping...
Embarrassment as US cyber ambassador’s Twitter account is hacked
Embarrassment as US cyber ambassador's Twitter account is hacked'Perils of the job' we're told A top US cyber diplomat said his Twitter account was compromised over...
Eurocops shut down Exclu encrypted messaging app, arrest dozens
Eurocops shut down Exclu encrypted messaging app, arrest dozensGerman and Dutch authorities say the app was a favorite of organized criminals and drug smugglers An encrypted...
Suspect in Finnish psychotherapy center blackmail hack arrested
Suspect in Finnish psychotherapy center blackmail hack arrestedSuomi sentence expected for shrink records theft French police have arrested a 25-year-old Finnish man accused of hacking a...
Scammers steal $4 million in crypto during face-to-face meeting
Scammers steal $4 million in crypto during face-to-face meetingDemand to display wallet full of coin facilitated mystery heist Ahad Shams, the co-founder of Web3 metaverse gaming...
Among the thousands of ESXiArgs ransomware victims? FBI and CISA to the rescue
Among the thousands of ESXiArgs ransomware victims? FBI and CISA to the rescueEvil code hits more than 3,800 servers globally, according to the Feds The US...
Uncle Sam wants to strip the IoS out of IoT with light crypto
Uncle Sam wants to strip the IoS out of IoT with light cryptoNIST weighs up algorithms for small devices – and an architecture for massive systems...
Codebreakers decipher Mary, Queen of Scots’ secret letters 436 years after her execution
Codebreakers decipher Mary, Queen of Scots' secret letters 436 years after her executionDigital sleuths chop through crypto challenge in 'surreal' search A team of codebreakers discovered...
Reddit reveals security incident that looks more SNAFU than TIFU
Reddit reveals security incident that looks more SNAFU than TIFUPhishing hooked internal documents, code, and some non-critical systems, but users' personal info safe Colorful web forum...