Microsoft announced it has taken legal action to disrupt the illegal use of copies of the post-exploitation tool Cobalt Strike by cybercriminals. Cobalt Strike is a paid...
Month: April 2023
Almost Half of Former Employees Say Their Passwords Still Work
An alarming number of organizations are not properly offboarding employees when they leave, especially in regard to passwords. In a March PasswordManager.com survey of 1,000 U.S....
Microsoft, Fortra & Health-ISAC Team Up to Remove Illicit Cobalt Strike Tools
Microsoft’s Digital Crimes Unit (DCU), security software vendor Fortra, and the Health Information Sharing and Analysis Center (Health-ISAC), have joined forces to remove cracked legacy copies...
TikTok, Other Mobile Apps Violate Privacy Regulations
The popular and increasingly controversial social media app TikTok must pay a fine of 12.7 million pounds (equivalent to around $16 million) in the UK for...
Printers Pose Persistent Yet Overlooked Threat
A rash of printer-related vulnerabilities in 2023 have punctuated security expert warnings that printers continue to be a significant source of vulnerability within companies — especially...
Bad Actors Will Use Large Language Models — but Defenders Can, Too
AI is dominating headlines. ChatGPT, specifically, has become the topic du jour. Everyone is taken by the novelty, the distraction. But no one is addressing the elephant...
US Space Force Requests $700M for Cybersecurity Blast Off
US Space Force top brass have requested a $700 million investment in cybersecurity as part of the military branch’s overall $30 billion 2024 budget. The Russian...
Friday Squid Blogging: Squid Food Poisoning
University of Connecticut basketball player Jordan Hawkins claims to have suffered food poisoning from calamari the night before his NCAA finals game. The restaurant disagrees: On...
AI and cyber security: Trends, challenges and future prospects
Yaniv Shechtman has over 15 years of expertise in cyber security, AI, and product management. At Check Point, Yaniv’s primary responsibility is to shape Check Point’s...
Microsoft leads global crackdown against Cobalt Strike, protecting healthcare from ransomware
EXECUTIVE SUMMARY: Microsoft, the Health Information Sharing and Analysis Center (Health-ISAC) and other partners have announced a widespread technical and legal crackdown against servers hosting “cracked”...
Best Patch Management Practices to Follow to Keep Your Business Secured
Patch management is an essential practice for businesses to maintain the security and stability of their IT infrastructure. Patches are released by software vendors to fix...
Cyber Incident Cripples UK Criminal Records Office
After weeks of silence, the UK’s Criminal Records Office (ACRO) has issued a statement saying that the issues with the website that have been ongoing since...
MSI Breach Claimed By Money Message Ransomware Gang
A recent data breach affecting Taiwanese PC parts maker MSI (Micro-Star International) has been listed on the extortion portal of a new ransomware gang known as...
What Is a Software Restriction Policy?
In today’s digital age, it is crucial for businesses to protect their sensitive data and computer systems from cyber threats. One effective way of doing so...
Apple fixes two zero-days exploited to hack iPhones and Macs
Apple has released emergency security updates to address two new zero-day vulnerabilities exploited in attacks to compromise iPhones, Macs, and iPads. “Apple is aware of a...
Exploit available for critical bug in VM2 JavaScript sandbox library
Proof-of-concept exploit code has been released for a recently disclosed critical vulnerability in the popular VM2 library, a JavaScript sandbox that is used by multiple software to...
MSI confirms security breach following ransomware attack claims
Following reports of a ransomware attack, Taiwanese PC vendor MSI (short for Micro-Star International) confirmed today that its network was breached in a cyberattack. Earlier this week,...
Massive Balada Injector campaign attacking WordPress sites since 2017
An estimated one million WordPress websites have been compromised during a long-lasting campaign that exploits “all known and recently discovered theme and plugin vulnerabilities” to inject...
Microsoft Edge can now generate images with AI
Microsoft Edge has become the first and only browser with an integrated AI image generator, allowing users to create images that do not exist yet, powered...
FBI warns of companies exploiting sextortion victims for profit
For-profit companies reportedly linked to sextortion activity are targeting victims using various deceptive tactics to pressure them into paying for “assistance” services provided by non-profit agencies...
Flipper Zero banned by Amazon for being a ‘card skimming device’
Amazon has banned the sale of the Flipper Zero portable multi-tool for pen-testers as it no longer allows its sale on the platform after tagging it...
Cybercriminals ‘CAN’ Steal Your Car, Using Novel IoT Hack
Automotive security experts have uncovered a novel method for stealing cars by breaking into their control systems through a headlight. The key (so to speak) is...
Fight AI With AI
On Wednesday, KPMG Studios, the consulting giant’s incubator, launched Cranium, a startup to secure artificial intelligence (AI) applications and models. Cranium’s “end-to-end AI security and trust...
Twitter ‘Shadow Ban’ Bug Gets Official CVE
A vulnerability in Twitter’s code was recently discovered that allows users to game the algorithm with mass blocking actions from large numbers of accounts, in an...
US Space Force Requests $700M for Cybersecurity Blast Off
US Space Force top brass have requested a $700 million investment in cybersecurity as part of the military branch’s overall $30 billion 2024 budget. The Russian...
DDoS attacks rise as pro-Russia groups attack Finland, Israel
Image: Golden Sikorka/Adobe Stock The pro-Russia hacker group NoName057(16) reportedly claimed it was behind Denial of Service (DoS) attacks against the Finnish parliament’s website on Tuesday,...
Weekly Update 342
Next time I post a poll about something as simple as “when is next Friday”, I don’t expect I’ll get as much interest. Of course “next...
Phishers migrate to Telegram
Experts warn that Telegram is becoming a privileged platform for phishers that use it to automate their activities and for providing various services. Kaspersky researchers have...
OCR Labs exposes its systems, jeopardizing major banking clients
A digital identification tool provided by OCR Labs to major banks and government agencies leaked sensitive credentials, putting clients at severe risk. London-based OCR Labs is...



























