Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
Month: April 2023
Clipboard-injecting malware disguises itself as Tor browser, steals cryptocurrency
Imagine you live in Russia and want to use the Tor browser to anonymise your browsing of the web. There’s a problem. Many people in Russia...
US sends million-dollar scammer to prison for four years
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
Smashing Security podcast #315: Crypto hacker hijinks, government spyware, and Utah social media shocker
A cryptocurrency hack leads us down a maze of twisty little passages, Joe Biden’s commercial spyware bill, and Utah gets tough on social media sites. All...
UK police reveal they are running fake DDoS-for-hire sites to collect details on cybercriminals
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
Can zero trust be saved?
Graham Cluley Security News is sponsored this week by the folks at Kolide. Thanks to the great team there for their support! Right now, “Zero Trust”...
Danger USB! Journalists sent exploding flash drives
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
Europe’s transport sector terrorised by ransomware, data theft, and denial-of-service attacks
A new report from ENISA, the European Union Agency for Cybersecurity, looking at cyberattacks targeting the European transport network over a period of almost two years,...
Fake GPT Chrome extension steals Facebook session cookies, breaks into accounts
The world has gone ChatGPT bonkers. Just about everyone is talking about it, and if you’re not talking about it then that’s because you’re too busy...
Smashing Security podcast #314: Photo cropping bombshell, TikTok debates, and real estate scams
It could be a case of aCropalypse now for Google Pixel users, there’s a warning for house buyers, and just why is TikTok being singled out...
Hack the Pentagon website promotes the benefits of bug bounties to US Military
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
Treading Water: The Struggle Against Third-Party Vulnerabilities and How True Automation Can Help.
By Dan Richings – Senior Vice President, Global Presales, Solutions Engineering, and Support – Adaptiva Using third-party software is unavoidable in today’s market. The competition and...
As Cyber Attacks Target Large Corporates, Teams Need to Evolve Data Security
By Karthikeyan Mariappan, VP of Engineering, Titaniam Chief information security officers (CISOs) and their teams zealously study attack data to determine how adversaries’ strategies are changing...
Security leaders are finally getting a seat at the table with corporate leadership – make good use of your time there
Looking to automation, engaging offensive security, and making the business case for building a robust cybersecurity strategy will help security leaders mature their program By Robert...
Next Generation Cybersecurity for Small to Midsize Businesses
How Cynet is giving lean security teams the tools they need to protect their business as budget crunches and reduced headcounts put many companies at risk...
Eight Tips for CISOs Trying Get Their Board on Board
By Ori Arbel, CTO, CYREBRO Nobody likes to be misunderstood, least of all C-level executives who play a key role in strategic decision-making in enterprises. Yet...
Zero Trust in a DevOps World
By Joel Krooswyk, Federal CTO, GitLab Inc. Although zero trust may seem like an overused buzzword, the approach is critical to securing people, devices, infrastructure, and...
Solving Cybersecurity Problems Arising in “Difficult Environments of High Uncertainty.”
By James Hess, CEO of Unknown Cyber Cybersecurity is a critical issue that affects organizations of all sizes and industries, but it can be particularly challenging...
Why Tackling Financial Crime Calls for A Privacy-First Approach
By Dr. Alon Kaufman, CEO and Co-Founder of Duality Technologies To gain the upper hand in the fight against financial crime, banks and other financial institutions...
Remaining Proactive at Identifying Risks Keeps You Ahead of Hackers
By Carl Torrence, Content Marketer at Marketing Digest Why is cybersecurity such a big issue in organizations all over the world? It’s simple — Data breaches...
New IcedID variants shift from bank fraud to malware delivery
New IcedID variants shift from bank fraud to malware deliveryPost ContentRead MoreProofpoint News Feed
North Korean Lazarus Group Linked to 3CX Supply Chain Hack
North Korean Lazarus Group Linked to 3CX Supply Chain HackTools, Code Used to Hack 3CX Desktop Confirm Cyberespionage Group's InvolvementSecurity researchers have uncovered more evidence that...
NATO and Diplomats’ Email Portals Targeted by Russian APT Winter Vivern
Winter Vivern (aka TA473), a Russian hacking group, has been exploiting vulnerabilities (CVE-2022-27926) in unpatched Zimbra instances to access the emails of NATO officials, governments, military...
Ukrainian Authorities Stop a Phishing Scam Worth $4.3 million
Ukraine’s Cyberpolice Department announced an operation during which they busted a phishing gang. The police arrested two scammers and confiscated equipment used for phishing frauds. Threat...
Smart Grid Fragility, a Constant Threat for the European and American Way of Living
In today’s world, a multitude of smart devices helps us to improve our lives, as we rely more and more on technology for a comfortable and...
Best Practices for Effective Identity Lifecycle Management (ILM)
In today’s fast-paced world, identity management has become a crucial aspect of every organization. From securing sensitive data to ensuring compliance with regulations, effective Identity Lifecycle...
Warning: Threat Actors Compromise 3CX Desktop App in a Supply Chain Attack
An ongoing supply chain attack allegedly uses a digitally signed and trojanized variant of the 3CX Voice Over Internet Protocol (VoIP) desktop client to target the...
The UK Government Shares New Strategy to Boost NHS Cybersecurity by 2030
The Department of Health and Social Care has established a cyber security program aimed at improving cyber resilience across the NHS and social care sectors in...
Companies Affected by Ransomware [2022-2023]
PR & VIDEO CONTENT MANAGER The increasing frequency and size of ransomware attacks are becoming a huge concern for thousands of organizations globally. All over the...
What Is User Provisioning?
User provisioning (also known as account provisioning) is a digital Identity and Access Management (IAM) process that involves creating employee/user accounts and their profiles and giving...