Callback phishing attacks see massive 625% growth since Q1 2021Phishing is constantly evolving to bypass user training and email protections, and as threat actors adopt new...
Author: admin
The evolution in and importance of securing the cloud 2022
The evolution in and importance of securing the cloud 2022EXECUTIVE SUMMARY: The adoption of cloud services can catalyze business innovation and growth. More than 90% of...
Windows KB5012170 Secure Boot DBX update may fail with 0x800f0922 error
Windows KB5012170 Secure Boot DBX update may fail with 0x800f0922 errorUsers may see a 0x800f0922 error when trying to install security update KB5012170 on the currently...
Why robotexts are scammers’ favorite new tool
Why robotexts are scammers' favorite new toolContenido de la entradaLeer másProofpoint News Feed
Russian hackers target Ukraine with default Word template hijacker
Russian hackers target Ukraine with default Word template hijackerThreat analysts monitoring cyberattacks on Ukraine report that the operations of the notorious Russian state-backed hacking group 'Gamaredon'...
Best penetration testing tools: 2022 buyer’s guide
Best penetration testing tools: 2022 buyer’s guideSecurity professionals need penetration testing tools to understand the security posture of every software environment. Check out our list of...
Almost 2,000 data breaches reported for the first half of 2022
Almost 2,000 data breaches reported for the first half of 2022Though the number of breaches reported in the first half of 2022 were lower than those...
Intel increases its arsenal against physical hardware attacks
Intel increases its arsenal against physical hardware attacksIntel introduced at Black Hat USA, a Tunable Replica Circuit to help protect against certain types of physical fault...
Russia’s Shuckworm cyber group launching ongoing attacks on Ukraine
Russia’s Shuckworm cyber group launching ongoing attacks on UkraineMalware downloading data logging and other espionage tools aimed at Ukrainian organizations. The post Russia’s Shuckworm cyber group...
CISO considerations for managed XDR investment
CISO considerations for managed XDR investmentHow managed XDR services can help businesses stay ahead of cyber security threatsLeer másArticles RSS FeedHow managed XDR services can help...
Upcoming Speaking Engagements
Upcoming Speaking EngagementsThis is a current list of where and when I am scheduled to speak: I’m speaking as part of a Geneva Centre for Security...
$23 Million YouTube Royalties Scam
$23 Million YouTube Royalties ScamScammers were able to convince YouTube that other peoples’ music was their own. They successfully stole $23 million before they were caught....
Threat Hunting Hypothesis Examples: Prepare For a Good Hunt!
Threat Hunting Hypothesis Examples: Prepare For a Good Hunt! A good threat hunting hypothesis is key to identifying weak spots in an organization’s digital infrastructure. Just...
Cuba Ransomware Detection: Tropical Scorpius Threat Actors Deploy Novel RAT Malware in Targeted Attacks
Cuba Ransomware Detection: Tropical Scorpius Threat Actors Deploy Novel RAT Malware in Targeted Attacks High-profile ransomware attacks illustrate a growing trend in the cyber threat arena...
A flaw in Xiaomi phones using MediaTek Chips could allow to forge transactions
A flaw in Xiaomi phones using MediaTek Chips could allow to forge transactionsFlaws in Xiaomi Redmi Note 9T and Redmi Note 11 models could be exploited to disable...
Iron Tiger APT is behind a supply chain attack that employed messaging app MiMi
Iron Tiger APT is behind a supply chain attack that employed messaging app MiMiChina-linked threat actors Iron Tiger backdoored a version of the cross-platform messaging app MiMi...
A new PyPI Package was found delivering fileless Linux Malware
A new PyPI Package was found delivering fileless Linux MalwareSecurity Researchers discovered a new PyPI Package designed to drop fileless cryptominer to Linux systems. Sonatype researchers...
SOVA Android malware now also encrypts victims’ files
SOVA Android malware now also encrypts victims’ filesSecurity researchers from Cleafy reported that the SOVA Android banking malware is back and is rapidly evolving. The SOVA...
Critical Infrastructure at Risk as Thousands of VNC Instances Exposed
Critical Infrastructure at Risk as Thousands of VNC Instances ExposedResearchers find many deployments have authentication disabledLeer másResearchers find many deployments have authentication disabled
Aspen Security Forum 2022 – Moderator: Courtney Kube – Niamh King’s Opening Remarks & National Security Today: Emerging Challenges and Opportunities
Aspen Security Forum 2022 – Moderator: Courtney Kube – Niamh King’s Opening Remarks & National Security Today: Emerging Challenges and OpportunitiesGeneral Richard Clarke, Commander, U.S. Special...
XKCD ‘Coffee Cup Holes’
XKCD ‘Coffee Cup Holes’ via the comic artistry and dry wit of Randall Munroe, resident at XKCD! Permalink The post XKCD ‘Coffee Cup Holes’ appeared first...
New Study Reveals Serious Cyber Insurance Shortfalls
New Study Reveals Serious Cyber Insurance ShortfallsMost companies do not have enough coverage to recover from ransomwareLeer másMost companies do not have enough coverage to recover...
Three Extradited from UK to US on $5m BEC Charges
Three Extradited from UK to US on $5m BEC ChargesNigerian nationals accused of targeting US universitiesLeer másNigerian nationals accused of targeting US universities
Aspen Security Forum 2022 – Moderator: Dafna Linzer – The 21st Century Nuclear Arms Race
Aspen Security Forum 2022 – Moderator: Dafna Linzer – The 21st Century Nuclear Arms RaceEmma Belcher, President, Ploughshares Fund Rose Gottemoeller, Former Deputy Secretary General, NATO...
#DEFCON: CISA Director Praises Congress and International Cybersecurity Cooperation
#DEFCON: CISA Director Praises Congress and International Cybersecurity CooperationJen Easterly discusses the progress and challenges at CISALeer másJen Easterly discusses the progress and challenges at CISA
5 tips for spotting and avoiding Pig butchering scams
5 tips for spotting and avoiding Pig butchering scamsA new type of scam, called “pig butchering” is gaining momentum. Pig butchering is a unique scam which...
#DEFCON: How Sanctions Impact Internet Operators
#DEFCON: How Sanctions Impact Internet OperatorsFollowing government sanctions against Russia, Internet providers have had to learn how to implement actionsLeer másFollowing government sanctions against Russia, Internet...
Dutch Authorities Arrest Tornado Cash Developer Following US Sanctions on Crypto Mixer Firm
Dutch Authorities Arrest Tornado Cash Developer Following US Sanctions on Crypto Mixer FirmThe Financial Advanced Cyber Team of the FIOD started the criminal investigation in JuneLeer...
The Importance of Faraday Technology with Aaron Zar from SLNT
The Importance of Faraday Technology with Aaron Zar from SLNTAaron Zar, SLNT founder and director of disconnection joins co-host Tom Eston to discuss the importance of...
Black Hat – Windows isn’t the only mass casualty platform anymore
Black Hat – Windows isn’t the only mass casualty platform anymoreWindows used to be the big talking point when it came to exploits resulting in mass...




























