Hackers are actively exploiting CVE-2022-47966 flaw in Zoho ManageEngineExperts warn of threat actors actively exploiting the critical CVE-2022-47966 (CVSS score: 9.8) flaw in Zoho ManageEngine. Multiple threat...
Month: February 2023
Highly evasive cryptocurrency miner targets macOS
Highly evasive cryptocurrency miner targets macOSResearchers warn of an evasive cryptojacking malware targeting macOS which spreads through pirated applications Jamf Threat Labs researchers reported that an...
A Scam in the Family—How a Close Relative Lost $100,000 to an Elder Scam
A Scam in the Family—How a Close Relative Lost $100,000 to an Elder Scam Written by James Schmidt Editor’s Note: We often speak of online scams...
Safer Internet Day: Through a Parent’s Eyes
Safer Internet Day: Through a Parent’s Eyes “Together for a better internet.” That’s the rallying cry of this year’s Safer Internet Day, and it’s one we’re...
Super Scams – Beat the Online Scammers Who Want to Sack Your Big Game
Super Scams – Beat the Online Scammers Who Want to Sack Your Big Game Cybercriminals will always try to cash in on a good thing, and...
McAfee+ Family Plans: The Right Protection for the Right People—Your People
McAfee+ Family Plans: The Right Protection for the Right People—Your People Knowing the whole family is protected online is a great feeling—that they’re safe from online...
3 Signs You May Be Caught in a Cryptocurrency Romance Scam
3 Signs You May Be Caught in a Cryptocurrency Romance Scam Swiping right is like a box of Valentine’s Day chocolates: You never know what you’re...
Why You Need to Watch Out When Using Public Wi-Fi
Why You Need to Watch Out When Using Public Wi-Fi If you’re like most people, you like to stay connected whether you are traveling or just...
When Does My Child Really Need A Phone?
When Does My Child Really Need A Phone? Deciding when to give your child a phone is not an easy task. Should you wait until they...
Are You Getting Caught by Click Bait?
Are You Getting Caught by Click Bait? It all feels so harmless. Who isn’t even alittle curious which celebrity is their look-a-like or what ’80s song...
Could ChatGPT Cause Heartbreak with Online Dating Scams?
Could ChatGPT Cause Heartbreak with Online Dating Scams? Scammers now have new tools to lure people who are looking for love online, by reeling in potential...
A Parent’s Guide to ChatGPT
A Parent’s Guide to ChatGPT ChatGPT is, without doubt, the biggest tech story of the year. It’s created debate in schools and universities, made history by...
Investigating the PlugX Trojan Disguised as a Legitimate Windows Debugger Tool
Investigating the PlugX Trojan Disguised as a Legitimate Windows Debugger ToolTrend Micro’s Managed Extended Detection and Response (MxDR) team discovered that a file called x32dbg.exe was...
DLL sideloading and CVE attacks show diversity of threat landscape
DLL sideloading and CVE attacks show diversity of threat landscapeStudies from Bitdefender and Arctic Wolf show that new tactics are using twists on concealment in social...
Dutch Police arrest three ransomware actors extorting €2.5 million
Dutch Police arrest three ransomware actors extorting €2.5 millionThe Amsterdam cybercrime police team has arrested three men for ransomware activity that generated €2.5 million from extorting...
Brave browser to block “open in app” prompts, pool-party attacks
Brave browser to block “open in app” prompts, pool-party attacksBrave Software, the developer of the privacy-focused web browser, has announced some plants for the upcoming version...
Stanford University discloses data breach affecting PhD applicants
Stanford University discloses data breach affecting PhD applicantsStanford University disclosed a data breach after files containing Economics Ph.D. program admission information were downloaded from its website between December...
Woman of the Week! Achieving success in cyber security
Woman of the Week! Achieving success in cyber securityColetta Vigh, Check Point’s Head of Worldwide Channel Strategy and Growth Initiatives, was recently honored as the Woman...
Rishi Sunak faces calls to ban TikTok use by government officials
Rishi Sunak faces calls to ban TikTok use by government officialsPM under pressure to follow EU and US in taking step over fears Chinese-owned app poses...
Crime Blotter: Hackers Fail to Honor Promises to Delete Data
Crime Blotter: Hackers Fail to Honor Promises to Delete DataPolice Say Gang Extorted Millions From Victims Not Just by Stealing, But Lying TooCybercrime experts have long...
Suspected NLBrute Malware Developer Pleads Not Guilty
Suspected NLBrute Malware Developer Pleads Not GuiltyTool Sold on Underground Market Often Used for Initial Access in Ransomware AttacksA Russian national accused by U.S. federal prosecutors...
How to Fight Check Fraud: Look Beyond Technology
How to Fight Check Fraud: Look Beyond TechnologyM&T Bank's Karen Boyer on Why Check Fraud Can't Be Solved With Technology AloneTools such as image analysis are...
ISMG Editors: Zero Trust Special
ISMG Editors: Zero Trust SpecialZero Trust Creator John Kindervag on ChatGPT, API Security, MFA BypassIn the latest weekly update, John Kindervag, creator of zero trust and...
Google se asocia con socios del ecosistema para mejorar la seguridad de los procesadores SoC
Google se asocia con socios del ecosistema para mejorar la seguridad de los procesadores SoCGoogle dijo que está trabajando con socios del ecosistema para fortalecer la...
Randall Munroe’s XKCD ‘Wish Interpretation’
Randall Munroe’s XKCD ‘Wish Interpretation’ via the comic artistry and dry wit of Randall Munroe, resident at XKCD! Permalink The post Randall Munroe’s XKCD ‘Wish Interpretation’...
OECD.AI Tools to Measure and Remove Bias
OECD.AI Tools to Measure and Remove BiasSome things I’ve been working on have been posted into the OECD.AI Policy Observatory. Go have a look at their...
Netography Detection Model Release – February 23, 2023
Netography Detection Model Release – February 23, 2023The Netography Threat Research Team has released its latest detections which include dashboard widgets and visibility on the use...
Why API Security Is Everywhere (Except Where You Need It)
Why API Security Is Everywhere (Except Where You Need It)Unfortunately, many devs and ops engineers don't view API security as a priority - and that's a...
What is Website Spoofing?
What is Website Spoofing?To protect against website spoofing, it is important to regularly monitor your website and ensure that it is properly secured against attacks. Learn...
Cybersecurity Fundamentals Training as E-Learning
Cybersecurity Fundamentals Training as E-LearningWe know that security teams need to focus on confidently and efficiently defending against cyberattacks. While Analyst training is crucial to building...
