Defeating Malvertising-Based Phishing Attacks Malvertising Enters a New Age While Google grapples with the potential threat that ChatGPT poses to its advertising business, cybercriminals are taking...
Month: March 2023
Digital Trust & Safety Roundup: Costly chargebacks, dynamically fighting ATO, and social media scam risks
Digital Trust & Safety Roundup: Costly chargebacks, dynamically fighting ATO, and social media scam risksExplore the cost of rising chargebacks, strategies for fighting ATO, and how...
USENIX Security ’22 – Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu – ‘Shuffle-based Private Set Union: Faster and More Secure’
USENIX Security ’22 – Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu – ‘Shuffle-based Private Set Union: Faster and More Secure’Our thanks to USENIX...
SafeBreach Coverage for US-CERT Alert (AA23-061A) – Royal Ransomware
SafeBreach Coverage for US-CERT Alert (AA23-061A) – Royal RansomwareSafeBreach coverage for US-CERT Alert (AA22-335A) - Cuba Ransomware The post SafeBreach Coverage for US-CERT Alert (AA23-061A) –...
Hundreds of thousands of websites hacked as part of redirection campaign
Hundreds of thousands of websites hacked as part of redirection campaignThousands of Websites Hijacked Using Compromised FTP Credentials Researchers reported that threat actors compromised thousands of...
Pegasus spyware used to spy on a Polish mayor
Pegasus spyware used to spy on a Polish mayorThe phone of an opposition-linked Polish mayor was infected with the powerful Pegasus spyware, local media reported. Reuters...
Friday Squid Blogging: We’re Almost at Flying Squid Drones
Friday Squid Blogging: We’re Almost at Flying Squid DronesResearchers are prototyping multi-segment shapeshifter drones, which are “the precursors to flying squid-bots.” As usual, you can also...
Top 10 open-source security and operational risks of 2023
Top 10 open-source security and operational risks of 2023Many software companies rely on open-source code but lack consistency in how they measure and handle risks and...
BidenCash market leaks over 2 million stolen credit cards for free
BidenCash market leaks over 2 million stolen credit cards for freeA carding marketplace known as BidenCash has leaked online a free database of 2,165,700 debit and...
The Week in Ransomware – March 3rd 2023 – Wide impact attacks
The Week in Ransomware - March 3rd 2023 - Wide impact attacksThis week was highlighted by a massive BlackBasta ransomware attack targeting DISH Network and taking...
What Happens When Cybersecurity Unicorns Lose Their Horns?
What Happens When Cybersecurity Unicorns Lose Their Horns?Noname Security Is Reportedly Up for Sale But Will Have to Shed Its Unicorn StatusIn the 21-month stretch from...
Live Webinar | How to Maximize Your ROI From Your Identity Projects
Live Webinar | How to Maximize Your ROI From Your Identity ProjectsPost ContentRead MoreDataBreachToday.com RSS Syndication
Chinese APT Group Deploying New Malware Backdoor
Chinese APT Group Deploying New Malware BackdoorMustang Panda Using MQsTTang Tool to Target Victims in Asia and Europe, Eset FindsChinese APT group Mustang Panda is deploying...
ISMG Editors: US Supreme Court May Limit Identity Theft Law
ISMG Editors: US Supreme Court May Limit Identity Theft LawAlso: ISMG Hosts Engage Event in Toronto; Vendor Wiz Quadruples WorkforceIn the latest weekly update, four ISMG...
Biden National Cyber Strategy Poses Challenges to Healthcare
Biden National Cyber Strategy Poses Challenges to HealthcareAdministration Must Address Lack of Resources, Reactionary Posture, Experts SayThe Biden administration's national cybersecurity strategy emphasizes bolstering critical infrastructure...
CISA Warns That Royal Ransomware Is Picking Up Steam
CISA Warns That Royal Ransomware Is Picking Up SteamUS Agency Says Royal Ransomware Group Is Made Up of Experienced Threat ActorsThe Royal ransomware group targeting critical...
Top Cyber Security Companies in Delhi
Top Cyber Security Companies in DelhiIntroduction Strong cyber security measures are now essential given the speed at which businesses are going digital and the rise in...
Known Vulnerabilities Drove Most Cyberattacks in 2022
Known Vulnerabilities Drove Most Cyberattacks in 2022 New research revealed an all-too-familiar theme: Known vulnerabilities for which patches have been issued were the main way threat...
Wading Back Into the Software Liability Cesspool
Wading Back Into the Software Liability Cesspool Time must be a flat circle—it seems that every couple of years, someone brings up the topic of software...
Cybersecurity Insights with Contrast CISO David Lindner | 3/3
Cybersecurity Insights with Contrast CISO David Lindner | 3/3 Insight #1 " June 11th, 2023 is getting closer. Have you started pulling together information for the...
Organizations Struggle With CCPA, CPRA, GDPR Compliance
Organizations Struggle With CCPA, CPRA, GDPR Compliance The vast majority—92% of companies across all verticals, states and business sizes—are still unprepared for compliance with the California Consumer...
Being with the “best of the best” as a YC Top Company
Being with the “best of the best” as a YC Top CompanySalt has long benefited from the unique support that comes from being part of the...
The ‘TLDR’ of the White House’s New Cyber Strategy: Collective Defense
The ‘TLDR’ of the White House’s New Cyber Strategy: Collective Defense If we could use just two words to summarize the National Cybersecurity Strategy published by...
Death By Social Media: Are TikTok and WeChat Easy Marks for Attackers?
Death By Social Media: Are TikTok and WeChat Easy Marks for Attackers? Most corporations understand the crucial need for efficient access management systems to protect the...
National Cybersecurity Strategy & Commercial Software Security
National Cybersecurity Strategy & Commercial Software SecurityNational Cybersecurity Strategy & Commercial Software Security ltabo Fri, 03/03/2023 - 14:59 A Bold Step Forward to Incentivize Software...
Microsoft FAIL: ‘BlackLotus’ Bootkit Breaks Secure Boot
Microsoft FAIL: ‘BlackLotus’ Bootkit Breaks Secure Boot The BlackLotus malware targets UEFI Secure Boot. For a mere $5000, you too can own it. The post Microsoft FAIL:...
5 top threats from 2022 most likely to strike in 2023
5 top threats from 2022 most likely to strike in 2023The threat landscape is highly diverse and attacks range in sophistication from the most basic scams...
Experts Warn of “SMS Pumping” Fraud Epidemic
Experts Warn of "SMS Pumping" Fraud EpidemicSmall businesses are particularly vulnerableRead MoreSmall businesses are particularly vulnerable
At Least 30% of “Cyber-Criminals” Are Women: Report
At Least 30% of "Cyber-Criminals" Are Women: ReportNew study uses AI to analyze text of dark web forum usersRead MoreNew study uses AI to analyze text...
NCSC: Twitter Users Should Find MFA Alternatives
NCSC: Twitter Users Should Find MFA AlternativesUK's security agency warns against letting protection lapseRead MoreUK's security agency warns against letting protection lapse
