Winter Vivern APT hackers use fake antivirus scans to install malwareAn advanced hacking group named 'Winter Vivern' targets European government organizations and telecommunication service providers to...
Microsoft support ‘cracks’ Windows for customer after activation fails
Microsoft support 'cracks' Windows for customer after activation failsIn an unexpected twist, a Microsoft support engineer resorted to running an unofficial 'crack' on a customer's Windows...
Convincing Twitter ‘quote tweet’ phone scam targets bank customers
Convincing Twitter 'quote tweet' phone scam targets bank customersA convincing Twitter scam is targeting bank customers by abusing the quote-tweets feature, as observed by BleepingComputer. The scam preys...
Microsoft unveils AI-powered Microsoft 365 Copilot assistant
Microsoft unveils AI-powered Microsoft 365 Copilot assistantMicrosoft has announced a new assistant powered by artificial intelligence to help boost productivity across Microsoft 365 apps, currently being tested...
Latitude cyberattack leads to data theft at two service providers
Latitude cyberattack leads to data theft at two service providersLatitude Financial Services (Latitude) has published a notice on its website today informing that it has suffered...
Supercharge your productivity, with five ingenious ChatGPT integrations
Supercharge your productivity, with five ingenious ChatGPT integrationsEXECUTIVE SUMMARY: The powerful next-generation artificial intelligence-based tool known as ChatGPT has not only captured the public’s imagination; it’s...
Voice system used to verify identity by Centrelink can be fooled by AI
Voice system used to verify identity by Centrelink can be fooled by AIExclusive: Voiceprint program used by millions of Australians to access data held by government...
Cryptohack Roundup: ChipMixer, Euler Finance, Unpatched Bugs
Cryptohack Roundup: ChipMixer, Euler Finance, Unpatched BugsAlso: Dero, Poolz Finance Hack and a Report on Ransomware FinancingEvery week, ISMG rounds up cybersecurity incidents in the world...
CISA advierte sobre el error de Adobe ColdFusion explotado como un día cero
CISA advierte sobre el error de Adobe ColdFusion explotado como un día ceroCISA ha agregado una vulnerabilidad crítica que afecta las versiones 2021 y 2018 de...
New Critical Flaw in FortiOS and FortiProxy Could Give Hackers Remote Access
New Critical Flaw in FortiOS and FortiProxy Could Give Hackers Remote AccessFortinet has released fixes to address 15 security flaws, including one critical vulnerability impacting FortiOS and...
CISA Issues Urgent Warning: Adobe ColdFusion Vulnerability Exploited in the Wild
CISA Issues Urgent Warning: Adobe ColdFusion Vulnerability Exploited in the WildThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on March 15 added a security vulnerability impacting Adobe ColdFusion...
How to Measure Your Risk Monitoring Activities
How to Measure Your Risk Monitoring ActivitiesThis article was originally featured in ASIS International Ideally, businesses should use data to inform and contextualize their most important...
The Comprehensive Value of Investing in Both Cybersecurity and Cyber Insurance
The Comprehensive Value of Investing in Both Cybersecurity and Cyber Insurance With ransomware attacks, social engineering, and data breaches at an all-time high, terms like “cybersecurity”...
Fidelis Cybersecurity’s Network Detection and Response (NDR) with Data Loss Prevention (DLP) and Deception Provides Several Advantages for AWS VPC Traffic Mirroring
Fidelis Cybersecurity’s Network Detection and Response (NDR) with Data Loss Prevention (DLP) and Deception Provides Several Advantages for AWS VPC Traffic MirroringThe post Fidelis Cybersecurity’s Network...
The Downside to March Madness – a Busted Bracket and a Data Breach
The Downside to March Madness – a Busted Bracket and a Data BreachBack in the 1930s, March Madness was used to describe the excitement and frenzy...
USENIX Security ’22 – Varun Madathil, Alessandra Scafuro, István András Seres, Omer Shlomovits, Denis Varlakov – ‘Private Signaling’
USENIX Security ’22 – Varun Madathil, Alessandra Scafuro, István András Seres, Omer Shlomovits, Denis Varlakov – ‘Private Signaling’DISTINGUISHED PAPER AWARD WINNER Our thanks to USENIX for...
Thwarting Threats in Healthcare: The Art of Threat Hunting
Thwarting Threats in Healthcare: The Art of Threat HuntingIn the healthcare industry, protecting patient data is of the utmost importance. But with the constantly evolving threat...
Taylor Swift Tour: Let’s Analyze Cyber Risk for a Ticket Company
Taylor Swift Tour: Let’s Analyze Cyber Risk for a Ticket Company Taylor Swift starts The Eras Tour this week, let’s hope in a happy ending to...
Benefits of Real-Time Bot Detection
Benefits of Real-Time Bot DetectionFor those unaware, the bot revolution is happening right before our eyes. In fact, nearly half of all internet traffic consists of...
Phishing for Financial Fears
Phishing for Financial Fears Over the last 4 days (as of the writing of this blog) the federal government has seized the assets of […] The...
Deep web vs. dark web: What businesses should know about both
Deep web vs. dark web: What businesses should know about bothThe everyday internet presents a variety of risks for businesses and consumers. Identity theft and unauthorized...
YoroTrooper APT group targets CIS countries and embassies
YoroTrooper APT group targets CIS countries and embassiesA new APT group, dubbed YoroTrooper, has been targeting government and energy organizations across Europe, experts warn. Cisco Talos researchers uncovered...
Russia-linked APT29 abuses EU information exchange systems in recent attacks
Russia-linked APT29 abuses EU information exchange systems in recent attacksRussia-linked APT29 group abused the legitimate information exchange systems used by European countries to target government entities....
Microsoft has another go at closing security hole exploited by Magniber ransomware
Microsoft has another go at closing security hole exploited by Magniber ransomwareIn its latest Patch Tuesday bundle of security fixes, Microsoft has patched a security flaw...
Smashing Security podcast #313: Tesla twins and deepfake dramas
Smashing Security podcast #313: Tesla twins and deepfake dramasThe twisted tale of the two Teslas, and a deepfake sandwich. All this and more is discussed in...
Humans are still better at creating phishing emails than AI — for now
Humans are still better at creating phishing emails than AI — for nowAI-generated phishing emails, including ones created by ChatGPT, present a potential new threat for...
Hacker selling data allegedly stolen in US Marshals Service hack
Hacker selling data allegedly stolen in US Marshals Service hackA threat actor is selling on a Russian-speaking hacking forum what they claim to be hundreds of...
LockBit ransomware claims Essendant attack, company says “network outage”
LockBit ransomware claims Essendant attack, company says “network outage”LockBit ransomware has claimed a cyber attack on Essendant, a wholesale distributer of office products after a "significant"...
FBI: Ransomware hit 860 critical infrastructure orgs in 2022
FBI: Ransomware hit 860 critical infrastructure orgs in 2022The Federal Bureau of Investigation (FBI) revealed in its 2022 Internet Crime Report that ransomware gangs breached the networks of at...
NordVPN open sources its Linux VPN client and libraries
NordVPN open sources its Linux VPN client and librariesNord Security (Nord) has released the source code of its Linux NordVPN client and associated networking libraries in...





























