Israeli spyware firm NSO Group is back with at least three new iOS 15 and iOS 16 zero-click exploit chains, which were used against human rights activists...
Month: April 2023
EFF on the UN Cybercrime Treaty
EFF has a good explainer on the problems with the new UN Cybercrime Treaty, currently being negotiated in Vienna. The draft treaty has the potential to...
Using LLMs to Create Bioweapons
I’m not sure there are good ways to build guardrails to prevent this sort of thing: There is growing concern regarding the potential misuse of molecular...
10 best antivirus software for businesses in 2023
McAfee Total Protection Kaspersky CrowdStrike Falcon Bitdefender GravityZone ESET Protect Avast Business Trend Micro Malwarebytes Symantec Endpoint Security Enterprise Microsoft Defender for Endpoint It’s nearly impossible...
New DDoS attacks on Israel’s enterprises, infrastructure should be a wake-up call
Experts see the latest DDoS attacks against Israel as a case study in the effectiveness of simple, brute-force cybersecurity attacks, even against the most sophisticated targets....
Takedown of GitHub Repositories Disrupts RedLine Malware Operations – Source: www.securityweek.com – Author: Ionut Arghire –
Source: www.securityweek.com – Author: Ionut Arghire. Category & Tags: Malware & Threats,malware – Malware & Threats,malware The RedLine information stealer’s operations have been disrupted after the...
New ‘Domino’ Malware Linked to FIN7 Group, Ex-Conti Members – Source: www.securityweek.com – Author: Ionut Arghire –
Source: www.securityweek.com – Author: Ionut Arghire. Category & Tags: Malware & Threats,malware – Malware & Threats,malware Distribution campaigns for a recently identified backdoor have revealed a...
SpecterOps Scores $25M Funding to Secure ID Attack Paths – Source: www.securityweek.com – Author: Ryan Naraine –
Source: www.securityweek.com – Author: Ryan Naraine. Category & Tags: Funding/M&A,Identity & Access – Funding/M&A,Identity & Access SpecterOps, a Seattle startup building technology to secure Microsoft’s Active...
NSO Group Used at Least 3 iOS Zero-Click Exploits in 2022: Citizen Lab – Source: www.securityweek.com – Author: Eduard Kovacs –
Source: www.securityweek.com – Author: Eduard Kovacs. Category & Tags: Malware & Threats,Mobile & Wireless,Vulnerabilities,Featured,iOS,Zero-Day – Malware & Threats,Mobile & Wireless,Vulnerabilities,Featured,iOS,Zero-Day Israeli spyware vendor NSO Group used...
Elon Musk Says He’ll Create ‘TruthGPT’ to Counter AI ‘Bias’ – Source: www.securityweek.com – Author: Associated Press –
Source: www.securityweek.com – Author: Associated Press. Category & Tags: Threat Intelligence,AI,ChatGPT – Threat Intelligence,AI,ChatGPT Billionaire Twitter owner Elon Musk is again sounding warning bells on the...
Mandiant 2023 M-Trends Report Provides Factual Analysis of Emerging Threat Trends – Source: www.securityweek.com – Author: Kevin Townsend –
Source: www.securityweek.com – Author: Kevin Townsend. Category & Tags: Threat Intelligence,Report – Threat Intelligence,Report In a year dominated by kinetic/cyber war in Ukraine, North Korea doubles...
Lockr Raises $2.5 Million for Identity and Data Protection Platform – Source: www.securityweek.com – Author: Ionut Arghire –
Source: www.securityweek.com – Author: Ionut Arghire. Category & Tags: Cybersecurity Funding,Funding/M&A,funding – Cybersecurity Funding,Funding/M&A,funding Personal identity and data protection provider Lockr this week announced a $2.5...
Cyberinsurance Backstop: Can the Industry Survive Without One? – Source: www.securityweek.com – Author: Kevin Townsend –
Source: www.securityweek.com – Author: Kevin Townsend. Category & Tags: Cyber Insurance,Government,Cyberinsurance,Featured – Cyber Insurance,Government,Cyberinsurance,Featured The cyberinsurance industry is lobbying for a government backstop. The government is...
CISA Adds Chrome, macOS Bugs to Known Exploited Vulnerabilities Catalog – Source: www.securityweek.com – Author: Eduard Kovacs –
Source: www.securityweek.com – Author: Eduard Kovacs. Category & Tags: Vulnerabilities,vulnerability – Vulnerabilities,vulnerability The US Cybersecurity and Infrastructure Security Agency (CISA) has added two flaws to its...
Cybersecurity M&A Roundup for April 1-15, 2023 – Source: www.securityweek.com – Author: Eduard Kovacs –
Source: www.securityweek.com – Author: Eduard Kovacs. Category & Tags: Funding/M&A,M&A Tracker,M&A – Funding/M&A,M&A Tracker,M&A Sixteen cybersecurity-related merger and acquisition (M&A) deals were announced in the first...
Army helicopter crash blamed on skipped software patch
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
Giving a Face to the Malware Proxy Service ‘Faceless’
For the past seven years, a malware-based proxy service known as “Faceless” has sold anonymity to countless cybercriminals. For less than a dollar per day, Faceless...
New ”Domino” Malware Strain Targets Corporate Networks
Researchers recently discovered a new malware family named “Domino”, allegedly created by ITG14, also known as the FIN7 threat group. Reportedly, ex-Conti hackers have been using...
Rheinmetall Suffers Another Cyberattack – Company Operations Still Functional
Rheinmetall, a leading German armaments and technology company, was targeted by a cyberattack over the weekend. The attack, however, did not affect company operations, according to officials....
Microsoft: Iranian hackers behind retaliatory cyberattacks on US orgs
Microsoft has discovered that an Iranian hacking group known as ‘Mint Sandstorm’ is conducting cyberattacks on US critical infrastructure in what is believed to be retaliation...
Australians lost a record $3.1 billion to scams last year
The Australian Competition & Consumer Commission (ACCC) says Australians lost a record $3.1 billion to scams in 2022, an 80% increase over the total losses recorded...
New sandbox escape PoC exploit available for VM2 library, patch now
A security researcher has released, yet another sandbox escape proof of concept (PoC) exploit that makes it possible to execute unsafe code on a host running...
The Attacks that can Target your Windows Active Directory
Active Directory is at the center of many attacks as it is still the predominant source of identity and access management in the enterprise. Hackers commonly...
Goldoson Malware Found in Dozens of Google Play Store Apps
Security researchers have discovered a new malicious software library capable of collecting lists of installed applications, a history of Wi-Fi and Bluetooth device information as well...
MuddyWater Uses SimpleHelp to Target Critical Infrastructure Firms
The Iranian government-sponsored threat actor known as MuddyWater has been observed using the legitimate SimpleHelp remote support software tool to achieve persistence on victim devices. According...
NSO Group’s Pegasus Spyware Found on High-Risk iPhones
Users in multiple countries have been impacted by spyware previously linked with NSO Group’s Pegasus malware over the past six months. The findings by Jamf Threat...
Researchers Discover First Ever Major Ransomware Targeting macOS
The infamous LockBit ransomware gang has developed a version of their malware for macOS devices — the first ever foray into Apple’s territory by a major...
Where There’s No Code, There’s No SDLC
We’ve come to rely heavily on the software development lifecycle (SDLC) as the go-to method to get security ingrained into development processes. In fact, the assumption...
APT41 Taps Google Red Teaming Tool in Targeted Info-Stealing Attacks
The advanced persistent threat known as APT41 has pressed into service an open source, red-teaming tool, Google Command and Control (GC2), for use in cyber espionage...
Why Your Anti-Fraud, Identity & Cybersecurity Efforts Should Be Merged
Across early-stage startups and mature public companies alike, we’re seeing a convergence of fraud prevention, identity and access management (IAM), and cybersecurity. It’s time for businesses...




























