Scandinavian Airlines Suffer Major Data Breach After CyberattackScandinavian Airline SAS reported a cyber attack Tuesday evening and advised customers not to use its app, but later...
Author:
Europol Shuts Down a Franco-Israeli CEO Fraud Group
Europol Shuts Down a Franco-Israeli CEO Fraud GroupEuropol put an end to the operations of a Franco-Israeli CEO fraud group. The threat actors used business email...
8 Free and Open Source Patch Management Tools for Your Company [Updated 2023]
8 Free and Open Source Patch Management Tools for Your Company [Updated 2023]Patch management tools are cybersecurity solutions that identify software applications running on outdated versions....
HardBit Asks Victims to Disclose Insurance Details to Set Ransom Demand
HardBit Asks Victims to Disclose Insurance Details to Set Ransom DemandThe second version of HardBit ransomware was observed trying to find out the victim`s insurance details....
Indian Government Agencies Targeted by Updated ReverseRAT Backdoor
Indian Government Agencies Targeted by Updated ReverseRAT BackdoorAn updated version of a backdoor called ReverseRAT is being deployed through spear-phishing campaigns targeting Indian government entities. Cybersecurity...
Google Confirms Increase In Russian Cyber Attacks Against Ukraine
Google Confirms Increase In Russian Cyber Attacks Against UkraineAccording to a new report released by Google’s Threat Analysis Group (TAG) and Mandiant, Russia’s cyber attacks against...
RailYatri Data Breach Leaves Over 30 Million Users Exposed
RailYatri Data Breach Leaves Over 30 Million Users ExposedOver 31 million people’s personal information was exposed as a result of a massive data breach at RailYatri,...
Five Million Downloads OyeTalk Android App Leaks Private User Conversations
Five Million Downloads OyeTalk Android App Leaks Private User ConversationsCyber researchers warn OyeTalk users that the app`s database exposed their private data and conversations to data...
ChatGPT: The Dark Side of Artificial Intelligence Crafting Custom Malware
ChatGPT: The Dark Side of Artificial Intelligence Crafting Custom MalwareIt’s easy to see why there has always been some skepticism and uncertainty about the emergence of...
What Are DNS Records? Types and Role in DNS Attacks Mitigation
What Are DNS Records? Types and Role in DNS Attacks MitigationDNS records or resource records (RR) contain various types of data about domain names and IP...
Driving Business Growth in Turbulent Times from the Perspective of SOC Prime’s CEO: Part II
Driving Business Growth in Turbulent Times from the Perspective of SOC Prime’s CEO: Part II How Fusing Sigma & MITRE ATT&CK® Empowers Collective Cyber Defense to...
Moving Connected Device Security Standards Forward
Moving Connected Device Security Standards ForwardPosted by Eugene Liderman, Director of Mobile Security Strategy, Google As Mobile World Congress approaches, we have the opportunity to have...
Cloud-ready and Channel-first
Cloud-ready and Channel-firstTrend Micro named one of 2023’s coolest cloud security companiesRead MoreTrend Micro Research, News, PerspectivesTrend Micro named one of 2023’s coolest cloud security companies
A Deep Dive into the Evolution of Ransomware Part 2
A Deep Dive into the Evolution of Ransomware Part 2This 3-part blog series takes an in-depth look at the evolution of ransomware business models, from the...
Clasiopa hackers use new Atharvan malware in targeted attacks
Clasiopa hackers use new Atharvan malware in targeted attacksSecurity researchers have observed a hacking group targeting companies in the materials research sector with a unique toolset that...
Russian malware dev behind NLBrute hacking tool extradited to US
Russian malware dev behind NLBrute hacking tool extradited to USA Russian malware developer accused of creating and selling the NLBrute password-cracking tool was extradited to the...
Fruit giant Dole suffers ransomware attack impacting operations
Fruit giant Dole suffers ransomware attack impacting operationsDole Food Company, one of the world's largest producers and distributors of fresh fruit and vegetables, has announced that it is...
European Commission bans staff using TikTok on work devices over security fears
European Commission bans staff using TikTok on work devices over security fearsParent company, ByteDance, says action is ‘misguided’ and has contacted commission to ‘set the record...
Third-Party Providers Create Identity and Access Control Challenges for Fintech Apps
Third-Party Providers Create Identity and Access Control Challenges for Fintech AppsFintech has drastically shifted the financial services industry toward digital technologies and, in so doing, has...
Israel’s Top Tech University Targeted by DarkBit Ransomware
Israel's Top Tech University Targeted by DarkBit RansomwareAn Israeli university is being blackmailed by hackers. However, they aren't just after money but are looking to send...
Coinbase Crypto Exchange Ensnared in ‘Oktapus’-Related Smishing Attack
Coinbase Crypto Exchange Ensnared in 'Oktapus'-Related Smishing AttackSome employees' personal data was leaked, but the company responded swiftly to a socially engineered incident that gained access...
Cyberthreats, Regulations Mount for Financial Industry
Cyberthreats, Regulations Mount for Financial IndustryNation-state adversaries, new reporting regulations, and a fast-paced threat landscape mean that financial services and technology firms need to bolster their...
Name That Toon: Join the Club
Name That Toon: Join the ClubFeeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.Read MoreDark...
Analysts Slam Twitter’s Decision to Disable SMS-Based 2FA
Analysts Slam Twitter's Decision to Disable SMS-Based 2FAMaking the option available only to paid subscribers — while also claiming SMS authentication is broken — doesn't make...
Malwarebytes Expands Platform With New Application Block Capabilities
Malwarebytes Expands Platform With New Application Block CapabilitiesLatest threat prevention module helps resource-strapped security teams block unsafe, untrusted or vulnerable applications.Read MoreDark ReadingLatest threat prevention module...
CREST Calls for Greater Equity, Inclusion and Diversity As Part of National Cyber Security Strategy
CREST Calls for Greater Equity, Inclusion and Diversity As Part of National Cyber Security StrategyPost ContentRead MoreDark Reading
Black Hat to Launch Official Certification Program
Black Hat to Launch Official Certification ProgramPost ContentRead MoreDark Reading
How to Stop Attackers That Target Healthcare Imaging Data
How to Stop Attackers That Target Healthcare Imaging DataAttribute-based encryption could help keep sensitive metadata off of the Dark Web.Read MoreDark ReadingAttribute-based encryption could help keep...
Scrut Automation Raises Funding of $7.5M, Led by MassMutual Ventures, Lightspeed, and Endiya Partners
Scrut Automation Raises Funding of $7.5M, Led by MassMutual Ventures, Lightspeed, and Endiya PartnersWith the fresh capital, Scrut aims to focus on simplifying risk management and...
4 Tips to Guard Against DDoS Attacks
4 Tips to Guard Against DDoS AttacksAttackers are now using multiple types of distributed denial-of-service (DDoS) attacks to take down sites. Here are some ways to...
