Bitcoin ATM customers hacked by video upload that was actually an appAs the misquote goes, "Once is misfortune..." This is the second time, and you know...
Month: March 2023
Embracing Biometric Identity Verification: A Look at Belgium and Kuwait Telecoms
Embracing Biometric Identity Verification: A Look at Belgium and Kuwait TelecomsThe country’s telecom authority has given Telenet, Belgium’s largest cable broadband service provider, permission to utilise...
DNSSEC is the Key to a Healthy Future for the Internet
DNSSEC is the Key to a Healthy Future for the Internet The future of internet connectivity could diverge into two very different outcomes—aggressive monopolization by a...
Identity Fabric: Why it’s Important for Identity Security
Identity Fabric: Why it’s Important for Identity SecurityUnderstand what an identity fabric is and its significance for modern Identity Security. Learn why it's crucial for protecting...
Six Ways to Foster a Security Mindset in Engineering Teams
Six Ways to Foster a Security Mindset in Engineering Teams Human error can be found at the root of the vast majority of cybersecurity breaches. According...
Why You Should Opt Out of Sharing Data With Your Mobile Provider
Why You Should Opt Out of Sharing Data With Your Mobile ProviderA new breach involving data from nine million AT&T customers is a fresh reminder that...
How Hackers are Exploiting Cloud Organizations | Eureka Security
How Hackers are Exploiting Cloud Organizations | Eureka SecurityProtect your organization from data breaches in the cloud. Learn how hackers are accessing sensitive data and growing...
Industry 4.0 vs. Smart Factory: What Will the Future Look Like?
Industry 4.0 vs. Smart Factory: What Will the Future Look Like?It isn’t easy to imagine the process that brings all our things into being. Just think...
USENIX Security ’22 – ‘Security At The End Of The Tunnel: The Anatomy Of VPN Mental Models Among Experts And Non-Experts In A Corporate Context’
USENIX Security ’22 – ‘Security At The End Of The Tunnel: The Anatomy Of VPN Mental Models Among Experts And Non-Experts In A Corporate Context’Complete Title:...
The AI Risk Landscape: How ChatGPT Is Shaping the Way Threat Actors Work
The AI Risk Landscape: How ChatGPT Is Shaping the Way Threat Actors WorkFlashpoint assesses that ChatGPT will lower the barrier to entry for basic hacking tasks,...
How to Ensure Your Development Complies With SOC 2
How to Ensure Your Development Complies With SOC 2Discover what you need to know from a development point of view for SOC 2 compliance. The post...
7 guidelines for identifying and mitigating AI-enabled phishing campaigns
7 guidelines for identifying and mitigating AI-enabled phishing campaignsThe emergence of effective natural language processing tools such as ChatGPT means it's time to begin understanding how...
BianLian ransomware group shifts focus to extortion
BianLian ransomware group shifts focus to extortionRansomware group BianLian has shifted the main focus of its attacks away from encrypting the files of its victims to...
CISA kicks off ransomware vulnerability pilot to help spot ransomware-exploitable flaws
CISA kicks off ransomware vulnerability pilot to help spot ransomware-exploitable flawsLast week, the US Cybersecurity and Infrastructure Security Agency (CISA) announced the launch of the Ransomware...
Scam Robocalls Forecast to Cost $58bn This Year
Scam Robocalls Forecast to Cost $58bn This YearJuniper Research says most of the pain will be felt in the USRead MoreJuniper Research says most of the...
“Hinata” Botnet Could Launch Massive DDoS Attacks
"Hinata" Botnet Could Launch Massive DDoS AttacksAkamai warns of new Mirai-like botnet written in GoRead MoreAkamai warns of new Mirai-like botnet written in Go
UK Ransomware Incident Volumes Surge 17% in 2022
UK Ransomware Incident Volumes Surge 17% in 2022Jumpsec report identified Karakurt, Lockbit and Vice Society among groups responsibleRead MoreJumpsec report identified Karakurt, Lockbit and Vice Society...
BreachForums Admin Arrested in New York
BreachForums Admin Arrested in New YorkConor Brian Fitzpatrick of Peekskill was apprehended last Wednesday following an FBI investigationRead MoreConor Brian Fitzpatrick of Peekskill was apprehended last...
KillNet Group Uses DDoS Attacks Against Azure-Based Healthcare Apps
KillNet Group Uses DDoS Attacks Against Azure-Based Healthcare AppsMicrosoft said it saw between 40 and 60 daily attacks in FebruaryRead MoreMicrosoft said it saw between 40...
Mispadu Trojan Steals 90,000+ Banking Credentials From Latin American Victims
Mispadu Trojan Steals 90,000+ Banking Credentials From Latin American VictimsThese included a number of government websites: 105 in Chile, 431 in Mexico and 265 in PeruRead...
Play ransomware gang hit Dutch shipping firm Royal Dirkzwager
Play ransomware gang hit Dutch shipping firm Royal DirkzwagerDutch maritime logistics company Royal Dirkzwager suffered a ransomware attack, the company was hit by the Play ransomware...
Emotet is back after a three-month hiatus
Emotet is back after a three-month hiatusThe infamous Emotet malware is back after a short hiatus, threat actors are spreading it via Microsoft OneNote email attachments. The...
Threat actors abuse Adobe Acrobat Sign to distribute RedLine info-stealer
Threat actors abuse Adobe Acrobat Sign to distribute RedLine info-stealerThreat actors are abusing the legitimate Adobe Acrobat Sign service to distribute the RedLine information stealer. Avast...
HinataBot: The Latest Go-based Threat Is Launching DDoS Attacks
HinataBot: The Latest Go-based Threat Is Launching DDoS AttacksIn January, a Go-based botnet named HinataBot (named after the character from the popular anime series Naruto) was...
Emotet Malware Spreads Out Through Malicious Microsoft OneNote Attachments
Emotet Malware Spreads Out Through Malicious Microsoft OneNote AttachmentsEmotet malware returns after three months break and uses Microsoft OneNote attachments to avoid macro-based security restrictions. Threat...
A Cancer Patient’s Fight for Justice Against a Hospital Ransomware Attack
A Cancer Patient’s Fight for Justice Against a Hospital Ransomware AttackA cancer patient whose naked medical photos and records were stolen by a ransomware gang and...
SOC Prime Threat Bounty — February 2023 Results
SOC Prime Threat Bounty — February 2023 Results Threat Bounty Publications In February 2023, members of the Threat Bounty Program significantly contributed to the SOC Prime...
Why You Should Opt Out of Sharing Data With Your Mobile Provider
Why You Should Opt Out of Sharing Data With Your Mobile ProviderA new breach involving data from nine million AT&T customers is a fresh reminder that...
S4x23 Review Part 3: Healthcare Cybersecurity Sessions
S4x23 Review Part 3: Healthcare Cybersecurity SessionsThis article focuses on the healthcare sector. Over the past two years, the healthcare sector has been in a constant...
First Dero cryptojacking campaign targets unprotected Kubernetes instances
First Dero cryptojacking campaign targets unprotected Kubernetes instancesLearn how this cryptocurrency campaign operates and its scope. Then, get tips on protecting vulnerable Kubernetes instances from this...





























