Romance scammers' favorite lies cost victims $1.3B last yearDon't trust your super-hot military boyfriend you've never met. He doesn't exist As Valentine's Day approaches, if your...
Day: February 23, 2023
Australia gives made-in-China CCTV cams the boot
Australia gives made-in-China CCTV cams the bootThe usual suspects - Hikvision and Dahua - named as a risk to national security, prompting the usual denials Australia's...
US teases more China tech sanctions, this time to deflate balloon-makers
US teases more China tech sanctions, this time to deflate balloon-makersState Dept already has one target, FBI is identifying sources of floating surveillance platform's components The...
US, UK slap sanctions on Russians linked to Conti, Ryuk, Trickbot malware
US, UK slap sanctions on Russians linked to Conti, Ryuk, Trickbot malwareAny act that sends so much as a ruble to seven named netizens now forbidden...
Ransomware crooks steal 3m+ patients’ medical records, personal info
Ransomware crooks steal 3m+ patients' medical records, personal infoAll that data coming soon to a darkweb crime forum near you? Several California medical groups have sent...
China’s spy balloon barrage earns six of its companies a spot on US entity list
China's spy balloon barrage earns six of its companies a spot on US entity listUS Commerce Department can't just let red balloons go by The US...
EnterpriseDB adds Transparent Data Encryption to PostgreSQL
EnterpriseDB adds Transparent Data Encryption to PostgreSQLThe new Transparent Data Encryption (TDE) feature will be shipped along with the company’s enterprise version of its database.Read MoreCSO...
Attacks on industrial infrastructure on the rise, defenses struggle to keep up
Attacks on industrial infrastructure on the rise, defenses struggle to keep upThe last year saw a rise in the sophistication and number of attacks targeting industrial...
Defending against attacks on Azure AD: Goodbye firewall, hello identity protection
Defending against attacks on Azure AD: Goodbye firewall, hello identity protectionNot too long ago, guarding access to the network was the focal point of defense for...
Descope launches authentication and user management SaaS
Descope launches authentication and user management SaaSDescope has launched its first product, a platform designed to help developers add authentication and user management capabilities to their...
5 biggest risks of using third-party services providers
5 biggest risks of using third-party services providersAs business processes become more complex, companies are turning to third parties to boost their ability to provide critical...
Cybersecurity startup Oligo debuts with new application security tech
Cybersecurity startup Oligo debuts with new application security techIsrael-based startup Oligo Security is exiting stealth mode with the public launch of its namesake software, offering a...
China-based cyberespionage actor seen targeting South America
China-based cyberespionage actor seen targeting South AmericaChina-based cyberespionage actor DEV-0147 has been observed compromising diplomatic targets in South America, according to Microsoft’s Security Intelligence team. The...
5 top threats from 2022 most likely to strike in 2023
5 top threats from 2022 most likely to strike in 2023The threat landscape is highly diverse and attacks range in sophistication from the most basic scams...
Call of Duty Developer Confirms Phishing Attempt but Not Breach
Call of Duty Developer Confirms Phishing Attempt but Not BreachSecurity researchers say hackers successfully exfiltrated contentRead MoreSecurity researchers say hackers successfully exfiltrated content
Time Taken to Deploy Ransomware Drops 94%
Time Taken to Deploy Ransomware Drops 94%Extortion found to be most common impact from cyber-attacks in 2022Read MoreExtortion found to be most common impact from cyber-attacks...
Putin Speech Interrupted by DDoS Attack
Putin Speech Interrupted by DDoS AttackOutage impacts Russian state media websitesRead MoreOutage impacts Russian state media websites
Npm Packages Used to Distribute Phishing Links
Npm Packages Used to Distribute Phishing LinksThe malicious packages were reportedly created using automated processesRead MoreThe malicious packages were reportedly created using automated processes
Hydrochasma Group Targets Asian Medical and Shipping Sectors
Hydrochasma Group Targets Asian Medical and Shipping SectorsThe hackers appear to have a possible interest in industries connected with COVID-19 treatmentsRead MoreThe hackers appear to have...
Open Source Flaws Found in 84% of Codebases
Open Source Flaws Found in 84% of CodebasesThe figures come from Synopsys’ new Open Source Security and Risk Analysis reportRead MoreThe figures come from Synopsys’ new...
Phishing Sites and Apps Use ChatGPT as Lure
Phishing Sites and Apps Use ChatGPT as LureCampaigns designed to steal card information and install malwareRead MoreCampaigns designed to steal card information and install malware
Russian Invasion Sparks Global Wiper Malware Surge
Russian Invasion Sparks Global Wiper Malware SurgeFortinet detected a 50% increase in destructive attacks in H2 2022Read MoreFortinet detected a 50% increase in destructive attacks in...
ICO Calls on Accountants to Improve SME Data Protection
ICO Calls on Accountants to Improve SME Data ProtectionA fifth of firms use accountants to help with complianceRead MoreA fifth of firms use accountants to help...
Dozens of Malicious ‘HTTP’ Libraries Found on PyPI
Dozens of Malicious 'HTTP' Libraries Found on PyPIReversingLabs cybersecurity researchers spotted 41 malicious PyPI packagesRead MoreReversingLabs cybersecurity researchers spotted 41 malicious PyPI packages
Hackers Use S1deload Stealer to Target Facebook, YouTube Users
Hackers Use S1deload Stealer to Target Facebook, YouTube UsersThe malicious software employs DLL sideloading techniques to run its malicious componentsRead MoreThe malicious software employs DLL sideloading...
WinorDLL64 Backdoor Linked to Lazarus Group
WinorDLL64 Backdoor Linked to Lazarus GroupThe Wslink loader can reportedly serve other connecting clients and load additional payloadsRead MoreThe Wslink loader can reportedly serve other connecting...
Cisco Event Response: February 2023 Semiannual Cisco FXOS and NX-OS Software Security Advisory Bundled Publication
Cisco Event Response: February 2023 Semiannual Cisco FXOS and NX-OS Software Security Advisory Bundled PublicationPost ContentRead MoreCisco Event Responses
Stealc, a new advanced infostealer appears in the threat landscape
Stealc, a new advanced infostealer appears in the threat landscapeResearchers spotted a new information stealer, called Stealc, which supports a wide set of stealing capabilities. In...
Resecurity warns about cyber-attacks on data center service providers
Resecurity warns about cyber-attacks on data center service providersResecurity warns about the increase of malicious cyber activity targeting data center service providers globally. According to the...
HardBit ransomware gang adjusts their demands so the insurance company would cover the ransom cost
HardBit ransomware gang adjusts their demands so the insurance company would cover the ransom costRecently emerged HardBit ransomware gang adjusts their demands so the insurance company...