The Guardian Confirms UK Staff Data Was Accessed in Ransomware AttackThe updates come from The Guardian's CEO Anna Bateson and its editor-in-chief Katharine VinerLeer másThe updates...
Year: 2023
Millions of Insurance Customers Compromised Via Supplier
Millions of Insurance Customers Compromised Via SupplierAflac and Zurich reveal major breaches this weekLeer másAflac and Zurich reveal major breaches this week
How to set up parental controls on your child’s new smartphone
How to set up parental controls on your child’s new smartphoneGive yourself peace of mind and help create a safe online space for your child using...
‘Tis the season for gaming: Keeping children safe (and parents sane)
‘Tis the season for gaming: Keeping children safe (and parents sane)It’s all fun and games over the holidays, but is your young gamer safe from the...
Attackers create 130K fake accounts to abuse limited-time cloud computing resources
Attackers create 130K fake accounts to abuse limited-time cloud computing resourcesA group of attackers is running a cryptomining operation that leverages the free or trial-based cloud...
2022 in review: 10 of the year’s biggest cyberattacks
2022 in review: 10 of the year’s biggest cyberattacksThe past year has seen no shortage of disruptive cyberattacks – here’s a round-up of some of the...
Illegal Crypto Transaction Volumes Hit All-Time High
Illegal Crypto Transaction Volumes Hit All-Time HighSanctioned entities accounted for the largest volumeLeer másSanctioned entities accounted for the largest volume
Cybersecurity trends and challenges to look out for in 2023
Cybersecurity trends and challenges to look out for in 2023What are some of the key cybersecurity trends and themes that organizations should have on their radars...
Euro Police Bust Multimillion-Dollar Crypto Fraud Gang
Euro Police Bust Multimillion-Dollar Crypto Fraud GangCriminal network may have made hundreds of millions from scamsLeer másCriminal network may have made hundreds of millions from scams
Twitter’s mushrooming data breach crisis could prove costly
Twitter's mushrooming data breach crisis could prove costlySince Elon Musk purchased Twitter in late October, non-stop turmoil and controversy have dogged the company, from massive staff...
Royal Mail’s Attackers Linked to Russia-Backed LockBit
Royal Mail's Attackers Linked to Russia-Backed LockBitThe ransomware gang allegedly used its latest encryptor, ‘Black,’ which borrows parts of the late Black Matter group’s encryptorLeer másThe...
The world’s most common passwords: What to do if yours is on the list
The world’s most common passwords: What to do if yours is on the listDo you use any of these extremely popular – and eminently hackable –...
Gaming: How much is too much for our children?
Gaming: How much is too much for our children?With many children spending a little too much time playing video games, learn to spot the signs things...
The doctor will see you now … virtually: Tips for a safe telehealth visit
The doctor will see you now … virtually: Tips for a safe telehealth visitAre your virtual doctor visits private and secure? Here’s what to know about,...
14 UK schools suffer cyberattack, highly confidential documents leaked
14 UK schools suffer cyberattack, highly confidential documents leakedMore than a dozen schools in the UK have suffered a cyberattack which has led to highly confidential...
Ransomware target list – Week in security with Tony Anscombe
Ransomware target list – Week in security with Tony AnscombeWhy schools, hospitals, local governments and other public sector organizations are in a sweet spot for ransomware...
11 top XDR tools and how to evaluate them
11 top XDR tools and how to evaluate themLittle in the modern IT world lends itself to manual or siloed management, and this is doubly true...
Hybrid work: Turning business platforms into preferred social spaces
Hybrid work: Turning business platforms into preferred social spacesHybrid work and hybrid play now merge into hybrid living, but where is the line between the two?...
Cracked it! Highlights from KringleCon 5: Golden Rings
Cracked it! Highlights from KringleCon 5: Golden RingsLearning meets fun at the 2022 SANS Holiday Hack Challenge – strap yourself in for a crackerjack ride at...
StrongPity espionage campaign targeting Android users
StrongPity espionage campaign targeting Android usersESET researchers identified an active StrongPity campaign distributing a trojanized version of the Android Telegram app, presented as the Shagle app...
If governments are banning TikTok, why is it still on your corporate devices?
If governments are banning TikTok, why is it still on your corporate devices?TikTok, the viral app resident on millions of devices, was recently banned from executive...
Now you can legally repair your tech – sort of
Now you can legally repair your tech – sort ofA new law portends a future where (we hope) it will be easier for us all to...
India’s Digital Personal Data Protection Bill: What works, what it lacks
India’s Digital Personal Data Protection Bill: What works, what it lacksA new draft of India’s data protection bill is set to be debated in Parliament, but...
Introducing IPyIDA: A Python plugin for your reverse‑engineering toolkit
Introducing IPyIDA: A Python plugin for your reverse‑engineering toolkitESET Research announces IPyIDA 2.0, a Python plugin integrating IPython and Jupyter Notebook into IDA The post Introducing...
Intel boosts VM security, guards against stack attacks in new Xeon release
Intel boosts VM security, guards against stack attacks in new Xeon releaseIntel today announced the rollout of the fourth generation of its Xeon family of server...
Data leak exposes information of 10,000 French social security beneficiaries
Data leak exposes information of 10,000 French social security beneficiaries[Editor's note: This article originally appeared on the Le Monde Informatique website.] More than 10,000 beneficiaries of...
Study shows attackers can use ChatGPT to significantly enhance phishing and BEC scams
Study shows attackers can use ChatGPT to significantly enhance phishing and BEC scamsSecurity researchers have used the GPT-3 natural language generation model and the ChatGPT chatbot...
Cybercriminals bypass Windows security with driver-vulnerability exploit
Cybercriminals bypass Windows security with driver-vulnerability exploitThe Scattered Spider cybercrime group has recently been observed attempting to deploy a malicious kernel driver using a tactic called...
Cybersecurity spending and economic headwinds in 2023
Cybersecurity spending and economic headwinds in 2023Now that everyone, their brother, sister, and dog have chimed in on cybersecurity predictions for 2023, here are a few...
CloudSek launches free security tool that helps users win bug bounty
CloudSek launches free security tool that helps users win bug bountyCybersecurity firm CloudSek has launched BeVigil, a tool that can tell users how safe the apps...