Crypto-Thieves Cost Victims 53 Times What They MakeReport reveals surging cloud bills for crypto-jacking victimsLeer másReport reveals surging cloud bills for crypto-jacking victims
Author: admin
Researchers Identify 3 Hacktivist Groups Supporting Russian Interests
Researchers Identify 3 Hacktivist Groups Supporting Russian InterestsAt least three alleged hacktivist groups working in support of Russian interests are likely doing so in collaboration with...
Chinese Espionage Hackers Target Tibetans Using New LOWZERO Backdoor
Chinese Espionage Hackers Target Tibetans Using New LOWZERO BackdoorA China-aligned advanced persistent threat actor known as TA413 weaponized recently disclosed flaws in Sophos Firewall and Microsoft...
North Korea’s Lazarus Hackers Targeting macOS Users Interested in Crypto Jobs
North Korea's Lazarus Hackers Targeting macOS Users Interested in Crypto JobsThe infamous Lazarus Group has continued its pattern of leveraging unsolicited job opportunities to deploy malware...
Hacker Behind Optus Breach Releases 10,200 Customer Records in Extortion Scheme
Hacker Behind Optus Breach Releases 10,200 Customer Records in Extortion SchemeThe Australian Federal Police (AFP) on Monday disclosed it's working to gather "crucial evidence" and that...
New NullMixer Malware Campaign Stealing Users’ Payment Data and Credentials
New NullMixer Malware Campaign Stealing Users' Payment Data and CredentialsCybercriminals are continuing to prey on users searching for cracked software by directing them to fraudulent websites...
Mobile, Cloud and Email Are Top Threat Vectors For 2023
Mobile, Cloud and Email Are Top Threat Vectors For 2023PwC study finds organizations have a long way to go on securityLeer másPwC study finds organizations have...
Experts Uncover 85 Apps with 13 Million Downloads Involved in Ad Fraud Scheme
Experts Uncover 85 Apps with 13 Million Downloads Involved in Ad Fraud SchemeAs many as 75 apps on Google Play and 10 on Apple App Store...
Critical WhatsApp Bugs Could Have Let Attackers Hack Devices Remotely
Critical WhatsApp Bugs Could Have Let Attackers Hack Devices RemotelyWhatsApp has released security updates to address two flaws in its messaging app for Android and iOS that could...
Ukraine Says Russia Planning Massive Cyberattacks on its Critical Infrastructures
Ukraine Says Russia Planning Massive Cyberattacks on its Critical InfrastructuresThe Ukrainian government on Monday warned of "massive cyberattacks" by Russia targeting critical infrastructure facilities located in...
Hackers Using PowerPoint Mouseover Trick to Infect System with Malware
Hackers Using PowerPoint Mouseover Trick to Infect System with MalwareThe Russian state-sponsored threat actor known as APT28 has been found leveraging a new code execution method that makes...
Facebook Shuts Down Covert Political ‘Influence Operations’ from Russia and China
Facebook Shuts Down Covert Political 'Influence Operations' from Russia and ChinaMeta Platforms on Tuesday disclosed it took steps to dismantle two covert influence operations originating from...
Cyber Criminals Using Quantum Builder Sold on Dark Web to Deliver Agent Tesla Malware
Cyber Criminals Using Quantum Builder Sold on Dark Web to Deliver Agent Tesla MalwareA recently discovered malware builder called Quantum Builder is being used to deliver...
Improve your security posture with Wazuh, a free and open source XDR
Improve your security posture with Wazuh, a free and open source XDROrganizations struggle to find ways to keep a good security posture. This is because it...
LeakBase: India Swachhata Platform Breached, 16 Million User PII Records Exposed
LeakBase: India Swachhata Platform Breached, 16 Million User PII Records ExposedData samples contain email addresses, hashed passwords and user IDs, other PIILeer másData samples contain email...
Researchers Warn of New Go-based Malware Targeting Windows and Linux Systems
Researchers Warn of New Go-based Malware Targeting Windows and Linux SystemsA new, multi-functional Go-based malware dubbed Chaos has been rapidly growing in volume in recent months to ensnare...
Five Steps to Mitigate the Risk of Credential Exposure
Five Steps to Mitigate the Risk of Credential ExposureEvery year, billions of credentials appear online, be it on the dark web, clear web, paste sites, or...
Swachh City Platform Suffers Data Breach Leaking 16 Million User Records
Swachh City Platform Suffers Data Breach Leaking 16 Million User RecordsA threat actor by the name of LeakBase has shared a database containing personal information allegedly...
Hackers Aid Protests Against Iranian Government with Proxies, Leaks and Hacks
Hackers Aid Protests Against Iranian Government with Proxies, Leaks and HacksSeveral hacktivist groups are using Telegram and other tools to aid anti-government protests in Iran to...
Government, Union-Themed Lures Used to Deliver Cobalt Strike Payloads
Government, Union-Themed Lures Used to Deliver Cobalt Strike PayloadsCisco Talos discovered the malicious campaign in August 2022Leer másCisco Talos discovered the malicious campaign in August 2022
Researchers Uncover Covert Attack Campaign Targeting Military Contractors
Researchers Uncover Covert Attack Campaign Targeting Military ContractorsA new covert attack campaign singled out multiple military and weapons contractor companies with spear-phishing emails to trigger a...
Optus breach – Aussie telco told it will have to pay to replace IDs
Optus breach – Aussie telco told it will have to pay to replace IDsLicence compromised? Passport number burned? Need a new one? Who's going to pay?Leer...
WhatsApp “zero-day exploit” news scare – what you need to know
WhatsApp “zero-day exploit” news scare – what you need to knowIs WhatsApp currently under active attack by cybercriminals? Is this a clear and current danger? How...
Brazilian Prilex Hackers Resurfaced With Sophisticated Point-of-Sale Malware
Brazilian Prilex Hackers Resurfaced With Sophisticated Point-of-Sale MalwareA Brazilian threat actor known as Prilex has resurfaced after a year-long operational hiatus with an advanced and complex malware to...
S3 Ep102: Cutting through cybersecurity news hype [Audio + Transcript]
S3 Ep102: Cutting through cybersecurity news hype [Audio + Transcript]Latest episode - listen now! Tell fact from fiction in hyped-up cybersecurity news...Leer másNaked SecurityLatest episode -...
Researchers Discover Chaos, a Golang Multipurpose Botnet
Researchers Discover Chaos, a Golang Multipurpose BotnetThe tool was written in Chinese and seemed China-based due to its C2 infrastructureLeer másThe tool was written in Chinese...
8 mistakes CIOs make and how to avoid them
8 mistakes CIOs make and how to avoid themFrom driving transformative change, to sharing insights into the political nature of the role, IT leaders and advisors...
CloudBees CEO: Software delivery is now ‘release orchestration’
CloudBees CEO: Software delivery is now ‘release orchestration’Enterprise software delivery company CloudBees has a new SaaS offering to discuss, and the firm's CEO gets philosophical. The...
Essential best practices: Securing critical national infrastructure
Essential best practices: Securing critical national infrastructureBy Deryck Mitchelson, Field CISO EMEA, Check Point Software Technologies. Last week, news reports indicated that a European government agency...
The Troublemaker CISO: How Much Profit Equals One Life?
The Troublemaker CISO: How Much Profit Equals One Life?Security Director Ian Keller Rants About Hospital Networks Being Internet-Connected"It's stupid and adds zero value," writes Ian Keller,...



























