IRS scams: How to avoid getting tricked Tax season is upon us, and you know what that means: It’s time for IRS scams to start showing...
Day: February 24, 2023
Cybersecurity Insights with Contrast CISO David Lindner | 2/24
Cybersecurity Insights with Contrast CISO David Lindner | 2/24 Insight #1 " A new report says 98% of organizations partner with breached third parties. It’s inevitable...
Tile Trackers Accountability Mode
Tile Trackers Accountability Mode One of the problems with tracking devices is that they can be used for good or for evil. When used for good,...
Putting Undetectable Backdoors in Machine Learning Models
Putting Undetectable Backdoors in Machine Learning ModelsThis is really interesting research from a few months ago: Abstract: Given the computational cost and technical expertise required to...
Threat Researchers Newsletter #7
Threat Researchers Newsletter #7Welcome to the latest edition of our monthly Threat Researchers newsletter! It's been a short month, but there have been no shortages from...
How an Automated Onboarding API Can Streamline Your Business Processes
How an Automated Onboarding API Can Streamline Your Business ProcessesWhat does Automated Onboarding exactly mean? Definition: Automated onboarding is a process designed and scripted before user...
How to Prevent SQL Injection Attacks?
How to Prevent SQL Injection Attacks?SQL injection has been troubling websites from over 17 years. It’s about time that you find out what it’s all about...
Okta Report Surfaces Progress on Shift to Zero-Trust
Okta Report Surfaces Progress on Shift to Zero-Trust A report published this week by Okta suggested that organizations have significantly shifted allocation of budgets to ensure...
Debunking Three Common Threat Modeling Myths
Debunking Three Common Threat Modeling Myths The benefits of threat modeling are significant. Not only does it provide a systematic process for evaluating potential threats to...
‘See No Evil’ — Mozilla SLAMS Google’s App Privacy Labels
‘See No Evil’ — Mozilla SLAMS Google’s App Privacy Labels Google doesn’t want you to know what your Android apps do with your data. That seems to...
Hackers are actively exploiting CVE-2022-47966 flaw in Zoho ManageEngine
Hackers are actively exploiting CVE-2022-47966 flaw in Zoho ManageEngineExperts warn of threat actors actively exploiting the critical CVE-2022-47966 (CVSS score: 9.8) flaw in Zoho ManageEngine. Multiple threat...
Highly evasive cryptocurrency miner targets macOS
Highly evasive cryptocurrency miner targets macOSResearchers warn of an evasive cryptojacking malware targeting macOS which spreads through pirated applications Jamf Threat Labs researchers reported that an...
A Scam in the Family—How a Close Relative Lost $100,000 to an Elder Scam
A Scam in the Family—How a Close Relative Lost $100,000 to an Elder Scam Written by James Schmidt Editor’s Note: We often speak of online scams...
McAfee+ Family Plans: The Right Protection for the Right People—Your People
McAfee+ Family Plans: The Right Protection for the Right People—Your People Knowing the whole family is protected online is a great feeling—that they’re safe from online...
Super Scams – Beat the Online Scammers Who Want to Sack Your Big Game
Super Scams – Beat the Online Scammers Who Want to Sack Your Big Game Cybercriminals will always try to cash in on a good thing, and...
Safer Internet Day: Through a Parent’s Eyes
Safer Internet Day: Through a Parent’s Eyes “Together for a better internet.” That’s the rallying cry of this year’s Safer Internet Day, and it’s one we’re...
Why You Need to Watch Out When Using Public Wi-Fi
Why You Need to Watch Out When Using Public Wi-Fi If you’re like most people, you like to stay connected whether you are traveling or just...
3 Signs You May Be Caught in a Cryptocurrency Romance Scam
3 Signs You May Be Caught in a Cryptocurrency Romance Scam Swiping right is like a box of Valentine’s Day chocolates: You never know what you’re...
Could ChatGPT Cause Heartbreak with Online Dating Scams?
Could ChatGPT Cause Heartbreak with Online Dating Scams? Scammers now have new tools to lure people who are looking for love online, by reeling in potential...
Are You Getting Caught by Click Bait?
Are You Getting Caught by Click Bait? It all feels so harmless. Who isn’t even alittle curious which celebrity is their look-a-like or what ’80s song...
When Does My Child Really Need A Phone?
When Does My Child Really Need A Phone? Deciding when to give your child a phone is not an easy task. Should you wait until they...
A Parent’s Guide to ChatGPT
A Parent’s Guide to ChatGPT ChatGPT is, without doubt, the biggest tech story of the year. It’s created debate in schools and universities, made history by...
Investigating the PlugX Trojan Disguised as a Legitimate Windows Debugger Tool
Investigating the PlugX Trojan Disguised as a Legitimate Windows Debugger ToolTrend Micro’s Managed Extended Detection and Response (MxDR) team discovered that a file called x32dbg.exe was...
DLL sideloading and CVE attacks show diversity of threat landscape
DLL sideloading and CVE attacks show diversity of threat landscapeStudies from Bitdefender and Arctic Wolf show that new tactics are using twists on concealment in social...
Dutch Police arrest three ransomware actors extorting €2.5 million
Dutch Police arrest three ransomware actors extorting €2.5 millionThe Amsterdam cybercrime police team has arrested three men for ransomware activity that generated €2.5 million from extorting...
Brave browser to block “open in app” prompts, pool-party attacks
Brave browser to block “open in app” prompts, pool-party attacksBrave Software, the developer of the privacy-focused web browser, has announced some plants for the upcoming version...
Stanford University discloses data breach affecting PhD applicants
Stanford University discloses data breach affecting PhD applicantsStanford University disclosed a data breach after files containing Economics Ph.D. program admission information were downloaded from its website between December...
Woman of the Week! Achieving success in cyber security
Woman of the Week! Achieving success in cyber securityColetta Vigh, Check Point’s Head of Worldwide Channel Strategy and Growth Initiatives, was recently honored as the Woman...
Rishi Sunak faces calls to ban TikTok use by government officials
Rishi Sunak faces calls to ban TikTok use by government officialsPM under pressure to follow EU and US in taking step over fears Chinese-owned app poses...
Crime Blotter: Hackers Fail to Honor Promises to Delete Data
Crime Blotter: Hackers Fail to Honor Promises to Delete DataPolice Say Gang Extorted Millions From Victims Not Just by Stealing, But Lying TooCybercrime experts have long...