Firms Who Pay Ransom Subsidise 10 New Attacks: ReportTrend Micro urges victim organizations to resist extorters demandsRead MoreTrend Micro urges victim organizations to resist extorters demands
Author:
Investment Scams Drive $9bn in Fraud in 2022
Investment Scams Drive $9bn in Fraud in 2022FTC says consumer fraud is up 30% on the previous yearRead MoreFTC says consumer fraud is up 30% on...
Russian IT “Brain Drain” Decentralizes Cybercrime
Russian IT “Brain Drain” Decentralizes CybercrimeRecorded Future claims war in Ukraine is having a major impactRead MoreRecorded Future claims war in Ukraine is having a major...
EU Commission Bans TikTok on Corporate Devices
EU Commission Bans TikTok on Corporate DevicesThe move aims to protect the Commission against cybersecurity threatsRead MoreThe move aims to protect the Commission against cybersecurity threats
CISA Calls For Increased Vigilance One Year After Ukraine’s Russian Invasion
CISA Calls For Increased Vigilance One Year After Ukraine's Russian InvasionIt warned nations' defenders against disruptive and defacement attacks todayRead MoreIt warned nations' defenders against disruptive...
Privacy Concerns Raised Over Android Apps’ Data Safety Labels
Privacy Concerns Raised Over Android Apps' Data Safety LabelsThe claims come from Mozilla's *Privacy Not Included researchersRead MoreThe claims come from Mozilla's *Privacy Not Included researchers
Threat actors leak Activision employee data on hacking forum
Threat actors leak Activision employee data on hacking forumData allegedly stolen from the American gaming giant Activision in December security breach were leaked on a cybercrime...
LastPass: hackers breached the computer of a DevOps engineer in a second attack
LastPass: hackers breached the computer of a DevOps engineer in a second attackThreat actors hacked the home computer of a DevOp engineer, they installed a keylogger...
5 Best Practices for a Multi-Factor Authentication (MFA) Strategy
5 Best Practices for a Multi-Factor Authentication (MFA) StrategyBy Zac Amos, Features Editor, ReHack Organizations and individuals must implement multi-factor authentication strategies to enhance any cybersecurity...
2023 Predictions
2023 PredictionsBy Dr. Chenxi Wang, Founder and Managing General Partner, Rain Capital For venture capitalists and investors with an eye on technology, 2022 was a chaotic...
A Deep Dive into the Evolution of Ransomware Part 3
A Deep Dive into the Evolution of Ransomware Part 3This 3-part blog series takes an in-depth look at the evolution of ransomware business models, from the...
Critical flaws in WordPress Houzez theme exploited to hijack websites
Critical flaws in WordPress Houzez theme exploited to hijack websitesHackers are actively exploiting two critical-severity vulnerabilities in the Houzez theme and plugin for WordPress, two premium...
New Exfiltrator-22 post-exploitation kit linked to LockBit ransomware
New Exfiltrator-22 post-exploitation kit linked to LockBit ransomwareThreat actors are promoting a new 'Exfiltrator-22' post-exploitation framework designed to spread ransomware in corporate networks while evading detection....
Microsoft Defender app now force-installed for Microsoft 365 users
Microsoft Defender app now force-installed for Microsoft 365 usersMicrosoft is now force-installing the Microsoft Defender for Individuals application when installing or updating the Microsoft 365 apps. [...]Read...
U.S. Marshals Service investigating ransomware attack, data theft
U.S. Marshals Service investigating ransomware attack, data theftThe U.S. Marshals Service (USMS) is investigating the theft of sensitive law enforcement information following a ransomware attack that...
LastPass: DevOps engineer hacked to steal password vault data in 2022 breach
LastPass: DevOps engineer hacked to steal password vault data in 2022 breachLastPass revealed more information on a "coordinated second attack," where a threat actor accessed and...
The war in Eastern Europe: One year later
The war in Eastern Europe: One year laterEXECUTIVE SUMMARY: Russia’s invasion of Ukraine marked the unexpected escalation of an eight-year conflict that began with Russia’s annexation...
5 tips to optimize your data center
5 tips to optimize your data centerBy Zac Amos, Features Editor, Rehack.com. Pursuing data center optimization is an excellent way to remain competitive in an increasingly crowded marketplace....
PureCrypter Targets North America, APAC Government Agencies
PureCrypter Targets North America, APAC Government AgenciesHackers Uses Same FTP Server as Earlier OneNote Phishing CampaignA campaign targeting government entities in the Asia-Pacific and North America...
US Official Reproaches Industry for Bad Cybersecurity
US Official Reproaches Industry for Bad CybersecurityCISA Director Says Programming Language Swap Will End Memory Safety VulnerabilitiesA top U.S. government official urged industry to become more...
Online Shopping Cart Software Vulnerable: German BSI Report
Online Shopping Cart Software Vulnerable: German BSI ReportBSI Study Finds Outdated Software, Vulnerable JavaScript LibrariesAn assessment of online shopping cart software used by e-commerce sites performed...
Australia Centralizes Government Cybersecurity Response
Australia Centralizes Government Cybersecurity ResponseHome Affairs Minister Clare O'Neil Dings Cybersecurity Law as 'Bloody Useless'The Australian government says it will centralize its approach to securing federal...
Fortinet soluciona 40 fallas, 2 críticas con PoC CVE-2022-39952 (PARCHA YA!)
Fortinet soluciona 40 fallas, 2 críticas con PoC CVE-2022-39952 (PARCHA YA!)Fortinet ha publicado actualizaciones de seguridad para abordar 40 vulnerabilidades en su línea de software, incluidos...
Guía de NSA para proteger redes domésticas
Guía de NSA para proteger redes domésticasLa Agencia de Seguridad Nacional de Estados Unidos (NSA) ha publicado una guía para proteger redes domésticas. La guía «Best...
Google Patches Chrome’s Fifth Zero-Day of the Year
Google Patches Chrome’s Fifth Zero-Day of the YearAn insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code...
Fake Reservation Links Prey on Weary Travelers
Fake Reservation Links Prey on Weary TravelersFake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and...
iPhone Users Urged to Update to Patch 2 Zero-Days
iPhone Users Urged to Update to Patch 2 Zero-DaysSeparate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat...
Twitter Whistleblower Complaint: The TL;DR Version
Twitter Whistleblower Complaint: The TL;DR VersionTwitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s...
Firewall Bug Under Active Attack Triggers CISA Warning
Firewall Bug Under Active Attack Triggers CISA WarningCISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.Read MoreThreatpostCISA...
Ransomware Attacks are on the Rise
Ransomware Attacks are on the RiseLockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.Read MoreThreatpostLockbit is by...
























