A new online threat actor has emerged: the Money Message ransomware gang. These cybercriminals are attacking companies all over the world, demanding millions of dollars in...
Month: April 2023
SCCM Alternative for Patch Management
In today’s cybersecurity space, properly patching the machines and servers in your company can make the difference between a well-secured organization and a vulnerable one. SCCM...
Cybersecurity unaligned with business goals is reactive … and flawed: Study
A new report for cybersecurity firm WithSecure suggests that most companies are investing in security solutions that are tactical and reactive, but not in line with...
BYOD and personal apps: A recipe for data breaches
Some 43% of employees have been targeted with work-related phishing attacks on their personal devices, says a survey from SlashNext. Image: Adobe Stock Employees might feel...
A Serial Tech Investment Scammer Takes Up Coding?
John Clifton Davies, a 60-year-old con man from the United Kingdom who fled the country in 2015 before being sentenced to 12 years in prison for...
The hidden danger to zero trust: Excessive cloud permissions
Graham Cluley Security News is sponsored this week by the folks at Sysdig. Thanks to the great team there for their support! What is one of...
aCropalypse now! Cropped and redacted images suffer privacy fail on Google Pixel smartphones
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
Free decryptor released for Conti-based ransomware following data leak
Security researchers have released a new decryption tool that should come to the rescue of some victims of a modified version of the Conti ransomware, helping...
Android phones can be hacked just by someone knowing your phone number
Well, this isn’t good. Google has issued a warning that some Android phones can be hacked remotely, without the intended victim having to click on anything....
Smashing Security podcast #313: Tesla twins and deepfake dramas
The twisted tale of the two Teslas, and a deepfake sandwich. All this and more is discussed in the latest edition of the “Smashing Security” podcast...
Microsoft has another go at closing security hole exploited by Magniber ransomware
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
Software supply chain attacks are on the rise — are you at risk?
Graham Cluley Security News is sponsored this week by the folks at Sysdig. Thanks to the great team there for their support! Attacks targeting the software...
STALKER 2 hacker demands Ukrainian game developer reinstates Russian language support, or else…
“STALKER 2: Heart of Chornobyl” is an action-packed video game for Windows, which sees players pitted against violent mutants and greedy thugs against a backdrop of...
FBI reveals that more money is lost to investment fraud than ransomware and business email compromise combined
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
WhatsApp and UK government on collision course, as app vows not to remove end-to-end encryption
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
Cryptocurrency companies backdoored in 3CX supply chain attack
Some of the victims affected by the 3CX supply chain attack have also had their systems backdoored with Gopuram malware, with the threat actors specifically targeting...
Capita cyberattack disrupted access to its Microsoft Office 365 apps
British outsourcing services provider Capita announced today that a cyberattack on Friday prevented access to its internal Microsoft Office 365 applications. London-based Capita employs 50,000 specialists and offers...
UK Runs Fake DDoS-for-Hire Sites
Brian Krebs is reporting that the UK’s National Crime Agency is setting up fake DDoS-for-hire sites as part of a sting operation: The NCA says all...
Western Digital discloses network breach, My Cloud service down
Western Digital announced today that its network has been breached and an unauthorized party gained access to multiple company systems. The California-based computer drive maker and...
Name That Edge Toon: Tower of Babble
We provide the cartoon. You write a witty cybersecurity-related caption to explain the scene above. Our favorite will win a $25 Amazon gift card. The contest ends on...
4 Steps for Shifting Left & Winning the Cybersecurity Battle
Customer satisfaction is today’s business battleground. The winners are the companies that deliver the best, highest-functioning software and applications in the shortest amount of time. ChatGPT...
The FDA’s Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say
The Food and Drug Administration (FDA) this week put into effect fresh guidance concerning the cybersecurity of medical devices — long a concerning area of risk...
Mimecast Report Reveals Nearly 60% of Companies in UAE and Saudi Arabia Need to Increase Cybersecurity Spending
DUBAI, UAE, March 31, 2023 /PRNewswire/ — Mimecast, an advanced email and collaboration security company, today announced the publication of its annual “The State of Email Security 2023” (SOES)...
Pro-Islam ‘Anonymous Sudan’ Hacktivists Likely a Front for Russia’s Killnet Operation
An apparently pro-Islamic group that has hit numerous targets in Europe with distributed denial of service (DDoS) attacks over the past few months may actually be...
Is Decentralized Identity About to Reach an Inflection Point?
Although the decentralized identity market is still in its infancy, it has been gaining traction in recent years and has the potential to change existing identity,...
Vulkan Playbook Leak Exposes Russia’s Plans for Worldwide Cyberwar
The release of thousands of pages of confidential documents has exposed Russian military and intelligence agencies’ grand plans for using their cyberwar capabilities in disinformation campaigns,...
US Space Force Requests $700M for Cybersecurity Blast Off
US Space Force top brass have requested a $700 million investment in cybersecurity as part of the military branch’s overall $30 billion 2024 budget. The Russian...
US threatens to ban TikTok unless Chinese owners divest
The Biden administration has threatened to ban TikTok in the US unless the social media company’s Chinese owners divest their stakes in it, according to news...
UK bans TikTok from government mobile phones
Britain is to ban the Chinese-owned video-sharing app TikTok from ministers’ and civil servants’ mobile phones, bringing the UK in line with the US and the...
AI can fool voice recognition used to verify identity by Centrelink and Australian tax office
A voice identification system used by the Australian government for millions of people has a serious security flaw, a Guardian Australia investigation has found. Centrelink and...




























