Google Gmail client-side encryption is available globallyGmail client-side encryption (CSE) is now available for Workspace Enterprise Plus, Education Plus, and Education Standard customers. Google announced that...
Day: March 2, 2023
GootLoader and FakeUpdates Malware Campaign Targets Law Firms
GootLoader and FakeUpdates Malware Campaign Targets Law FirmsTwo separate threat campaigns targeted six different law firms in January and February 2023, distributing GootLoader and FakeUpdates, also...
Stay Vigilant: Trezor Reports a Massive Crypto Wallet Phishing Scam
Stay Vigilant: Trezor Reports a Massive Crypto Wallet Phishing ScamA phishing campaign poses as a Trezor data breach notification order to steal a target’s cryptocurrency wallet...
What Is Clone Phishing? Definition, Examples, and Prevention Measures
What Is Clone Phishing? Definition, Examples, and Prevention MeasuresCybercriminals are using phishing attacks to spread malware and other online threats. But as we get smarter and...
WhatsApp, Teams, and Telegram – Banned in Russian Government Organizations
WhatsApp, Teams, and Telegram – Banned in Russian Government OrganizationsStarting March 1st, the Russian law ”On Information, Information Technologies and Information Protection” forbids state organizations to...
Most Popular Ethical Hacking Tools in 2023
Most Popular Ethical Hacking Tools in 2023Last time we talked about what ethical hacking is, what are its key concepts and what are the benefits it...
Can The US-Led Multinational Counterattack Stop Ransomware’s Gold Rush?
Can The US-Led Multinational Counterattack Stop Ransomware’s Gold Rush?By Camellia Chan, CEO & founder of Flexxon I was honored to be one of the representatives from...
Cybersecurity Attacks To Come: Here’s How To Prepare
Cybersecurity Attacks To Come: Here’s How To PrepareBy Russ Reeder, CEO, Netrix Global Ensuring 100% prevention against all cyberattacks is impossible today, as modern perpetrators find...
Detect PlugX Trojan Masquerading as a Legitimate Windows Debugger Tool to Fly Under the Radar
Detect PlugX Trojan Masquerading as a Legitimate Windows Debugger Tool to Fly Under the Radar Old dog, new tricks! Security researchers revealed PlugX remote access Trojan...
Indigo Books & Music refuses to pay ransom after hackers stole employee information
Indigo Books & Music refuses to pay ransom after hackers stole employee informationFollowing what it called a "cybersecurity incident" three weeks ago, Canadian bookstore chain Indigo...
WH Smith investigates hacking attack after employee data stolen
WH Smith investigates hacking attack after employee data stolenBritish high street giant WH Smith has revealed that it has suffered a "cybersecurity incident," which has seen...
Trezor crypto wallets under attack in SMS phishing campaign
Trezor crypto wallets under attack in SMS phishing campaignWillie Sutton, the criminal who became legendary for stealing from banks during a forty year career, was once...