New Stealthy Shikitega Malware Targeting Linux Systems and IoT DevicesA new piece of stealthy Linux malware called Shikitega has been uncovered adopting a multi-stage infection chain...
Author: admin
North Korean Hackers Deploying New MagicRAT Malware in Targeted Campaigns
North Korean Hackers Deploying New MagicRAT Malware in Targeted CampaignsThe prolific North Korean nation-state actor known as the Lazarus Group has been linked to a new...
4 Key Takeaways from “XDR is the Perfect Solution for SMEs” webinar
4 Key Takeaways from "XDR is the Perfect Solution for SMEs" webinarCyberattacks on large organizations dominate news headlines. So, you may be surprised to learn that...
Some Members of Conti Group Targeting Ukraine in Financially Motivated Attacks
Some Members of Conti Group Targeting Ukraine in Financially Motivated AttacksFormer members of the Conti cybercrime cartel have been implicated in five different campaigns targeting Ukraine...
Authorities Shut Down WT1SHOP Site for Selling Stolen Credentials and Credit Cards
Authorities Shut Down WT1SHOP Site for Selling Stolen Credentials and Credit CardsAn international law enforcement operation has resulted in the dismantling of WT1SHOP, an online criminal marketplace...
Top 5 Zero-Day Vulnerabilities of August
Top 5 Zero-Day Vulnerabilities of AugustZero day vulnerabilities and exploits are unexpected, hence zero-day protection is required. Here are some suggestions for preventing zero-day attacks on...
Game-Related Cyber-Threats: Almost 100k Malicious Files Last Year
Game-Related Cyber-Threats: Almost 100k Malicious Files Last YearKaspersky also observed an increase in the number of programs that can steal secretsLeer másKaspersky also observed an increase...
Password Reuse is Putting MSP’s at Risk
Password Reuse is Putting MSP’s at RiskPassword hygiene is a huge priority for Managed Service Providers Every organization is at risk for cyber attack, but MSPs...
Google Vulnerability Reward Program Focuses on Open Source Software
Google Vulnerability Reward Program Focuses on Open Source Software Google’s bug bounty program will be expanded to include a special open source section called the Open...
BlackCat Ransomware Linked to Italy’s Energy Services Firm Hack
BlackCat Ransomware Linked to Italy's Energy Services Firm HackThe ransomware group claimed to have downloaded 700GB of data from GSELeer másThe ransomware group claimed to have...
The Mayhem for API Difference – A ZAP – API Scan Comparison
The Mayhem for API Difference – A ZAP – API Scan ComparisonWith the rapid development of modern web APIs, developers must balance quality, reliability, and security...
Meta Fined $400m in Ireland For Children’s Privacy Breach
Meta Fined $400m in Ireland For Children's Privacy BreachInstagram allowed children to run business accounts, which showed phone numbers and email addressesLeer másInstagram allowed children to...
Using Backups to Turn the Tables on Ransomware
Using Backups to Turn the Tables on Ransomware When an enterprise gets hit with ransomware, the fundamental question is whether the cost of downtime is greater...
In-app browser security risks, and what to do about them
In-app browser security risks, and what to do about themIn-app browsers can pose significant security risks to businesses, with their tendency to track data a primary...
Cloud-Based File Systems as a Ransomware Defense
Cloud-Based File Systems as a Ransomware Defense Ransomware is an unfortunate and unavoidable fact of life for businesses today. Attackers are escalating their attacks on organizations...
Interpol Busts Asian Sextortion Syndicate
Interpol Busts Asian Sextortion SyndicateCops launched public awareness campaign in June to warn potential victimsLeer másCops launched public awareness campaign in June to warn potential victims
California Regulators Hit Sephora with $1.2M Fine
California Regulators Hit Sephora with $1.2M Fine Regulators have roared back from a pandemic-induced stupor that seemingly tamped down some of the most aggressive actions at...
Orgs Report Mixed Progress on Ransomware Defense
Orgs Report Mixed Progress on Ransomware Defense A survey of 400 technology, financial and security leaders published today by HYCU, a provider of a data protection...
Half of Firms Report Supply Chain Ransomware Compromise
Half of Firms Report Supply Chain Ransomware CompromiseStudy highlights threat detection challenge for many organizationsLeer másStudy highlights threat detection challenge for many organizations
TikTok denies breach after hackers claim billions of user records stolen
TikTok denies breach after hackers claim billions of user records stolenTikTok is denying claims that a hacking group has breached an Alibaba cloud database containing 2.05...
BSides Vancouver 2022 – Josh Dominguez’ ‘Tips And Advice For Your Early Journey In Cybersecurity’
BSides Vancouver 2022 – Josh Dominguez’ ‘Tips And Advice For Your Early Journey In Cybersecurity’Our sincere thanks to BSides Vancouver for publishing their outstanding conference videos...
FBI K-12 Ransomware Warning as LAUSD is Hit
FBI K-12 Ransomware Warning as LAUSD is HitSecond-largest US school district compromised over the weekendLeer másSecond-largest US school district compromised over the weekend
Transparency and policy shapes Cloudflare’s Kiwi Farms decisions
Transparency and policy shapes Cloudflare’s Kiwi Farms decisionsCloudflare percolated back into the news cycle last week when the company, which provides security services to websites, blocked...
Instagram faces $402 million fine for alleged mishandling of children’s data
Instagram faces $402 million fine for alleged mishandling of children’s dataThe Irish Data Protection Commissioner will fine Instagram $402 million for allegedly mishandling the personal data...
Authorities Take Down Prolific WT1SHOP Cybercrime Marketplace
Authorities Take Down Prolific WT1SHOP Cybercrime MarketplacePortuguese and US authorities seize website and domainsLeer másPortuguese and US authorities seize website and domains
4 strategy game-changers for finding cybersecurity talent
4 strategy game-changers for finding cybersecurity talentDave Stirling, CISO of Zions Bancorporation, isn’t waiting for a shakeup in the talent pool or some big shift in...
UK Privacy Regulator Fines Halfords for Spam Deluge
UK Privacy Regulator Fines Halfords for Spam DelugeRetailer sent half a million emails to people without their consentLeer másRetailer sent half a million emails to people...
InterContinental Hotels Confirms Cyber-Attack After Two-Day Outage
InterContinental Hotels Confirms Cyber-Attack After Two-Day OutageIHG is assessing the nature, extent and impact of the incident and implementing response plansLeer másIHG is assessing the nature,...
A new Android malware used to spy on the Uyghur Community
A new Android malware used to spy on the Uyghur CommunityExperts spotted new Android spyware that was used by China-linked threat actors to spy on the Uyghur...
Worok: The big picture
Worok: The big pictureFocused mostly on Asia, this new cyberespionage group uses undocumented tools, including steganographically extracting PowerShell payloads from PNG files The post Worok: The...





























