DolphinCape Malware Detection: Phishing Campaign Against Ukrainian Railway Transport Organization of Ukraine “Ukrzaliznytsia” Related to the Use of Iranian Shahed-136 Drones Since the outbreak of the...
North Korean hackers exploit Seoul Halloween tragedy in zero-day attack
North Korean hackers exploit Seoul Halloween tragedy in zero-day attackMalicious hackers, hell-bent on infiltrating an organisation, have no qualms about exploiting even the most tragic events....
Smashing Security podcast #301: AI chatbot or the start of Skynet? Eufy privacy, and hot desks
Smashing Security podcast #301: AI chatbot or the start of Skynet? Eufy privacy, and hot desksAn AI chatbot is causing a stir - both impressing and...
Metaparasites: The cybercriminals who rip each other off
Metaparasites: The cybercriminals who rip each other offResearchers at Sophos have investigated so-called "metaparasites" - the scammers who scam other scammers.Leer másGraham CluleyResearchers at Sophos have...
Hive ransomware gang claims responsibility for attack on Intersport that left cash registers disabled
Hive ransomware gang claims responsibility for attack on Intersport that left cash registers disabledSports retail giant Intersport, which boasts some 6000 stores worldwide in 57 countries,...
Rackspace customers rage following ransomware attack, as class-action lawsuits filed
Rackspace customers rage following ransomware attack, as class-action lawsuits filedAs ever, what matters most is not so much whether an organisation gets hit or not by...
CryWiper Data Wiper Targeting Russian Sites
CryWiper Data Wiper Targeting Russian SitesKaspersky is reporting on a data wiper masquerading as ransomware that is targeting local Russian government networks. The Trojan corrupts any...
Security Vulnerabilities in Eufy Cameras
Security Vulnerabilities in Eufy CamerasEufy cameras claim to be local only, but upload data to the cloud. The company is basically lying to reporters, despite being...
Leaked Signing Keys Are Being Used to Sign Malware
Leaked Signing Keys Are Being Used to Sign MalwareA bunch of Android OEM signing keys have been leaked or stolen, and they are actively being used...
The Decoupling Principle
The Decoupling PrincipleThis is a really interesting paper that discusses what the authors call the Decoupling Principle: The idea is simple, yet previously not clearly articulated:...
Friday Squid Blogging: China Bans Taiwanese Squid Imports
Friday Squid Blogging: China Bans Taiwanese Squid ImportsToday I have some squid geopolitical news. As usual, you can also use this squid post to talk about...
Hacking Trespass Law
Hacking Trespass LawThis article talks about public land in the US that is completely surrounded by private land, which in some cases makes it inaccessible to...
Apple Is Finally Encrypting iCloud Backups
Apple Is Finally Encrypting iCloud BackupsAfter way too many years, Apple is finally encrypting iCloud backups: Based on a screenshot from Apple, these categories are covered...
New Ransom Payment Schemes Target Executives, Telemedicine
New Ransom Payment Schemes Target Executives, TelemedicineRansomware groups are constantly devising new methods for infecting victims and convincing them to pay up, but a couple of...
How To Help Your Family Protect Their Online Data
How To Help Your Family Protect Their Online Data Whether you’re standing around the water cooler at work, waiting for your kids at the school gate...
Let’s Make Security Easy
Let’s Make Security Easy You flick through some reels and an ad for “a more private phone” crops up. You scroll through your news feed and...
Unwrapping Some of the Holiday Season’s Biggest Scams
Unwrapping Some of the Holiday Season’s Biggest Scams Even with the holidays in full swing, scammers won’t let up. In fact, it’s high time for some...
Fake Security App Found Abuses Japanese Payment System
Fake Security App Found Abuses Japanese Payment System Authored by SangRyol Ryu and Yukihiro Okutomi McAfee’s Mobile Research team recently analyzed new malware targeting mobile payment...
Industry 4.0: CNC Machine Security Risks Part 3
Industry 4.0: CNC Machine Security Risks Part 3This three-part blog series explores the risks associated with CNC machinesLeer másTrend Micro Research, News, PerspectivesThis three-part blog series...
2022’s Top 5 App Security Tips
2022’s Top 5 App Security Tips Happy National App Day! No, we don’t mean apps of the mozzarella stick and potato skin variety, but your mobile...
The biggest data breaches and leaks of 2022
The biggest data breaches and leaks of 2022Discover this year’s biggest data breaches and leaks including Medibank, SHEIN and TwitterLeer másArticles RSS FeedDiscover this year’s biggest...
McAfee 2023 Threat Predictions: Evolution and Exploitation
McAfee 2023 Threat Predictions: Evolution and Exploitation As 2022 draws to a close, the Threat Research Team at McAfee Labs takes a look forward—offering their predictions...
BeReal – The Newest Kid On The Social Media Block
BeReal – The Newest Kid On The Social Media Block Without doubt, the biggest criticism we all have of social media is that everyone always looks...
‘Tis the Season for Holiday Scams
‘Tis the Season for Holiday Scams This time of year, the air not only gets chillier but a bit cheerier for everyone … including online scammers....
The global state of the cyber security industry 2022
The global state of the cyber security industry 2022This exclusive report aims to keep cyber security professionals abreast of today’s threats and highlight the areas in...
A PayPal Email Scam Is Making the Rounds: Here’s How to Identify and Avoid It
A PayPal Email Scam Is Making the Rounds: Here’s How to Identify and Avoid It Payment applications make splitting restaurant bills, taxi fares, and household expenses...
Cybersecurity Reflections from 26 Years at Trend
Cybersecurity Reflections from 26 Years at TrendTrend Micro is one of the few cybersecurity vendors today that can protect your entire world, whether it is your...
Trust in transparency: Private Compute Core
Trust in transparency: Private Compute CorePosted by Dave Kleidermacher, Dianne Hackborn, and Eugenio Marchiori We care deeply about privacy. We also know that trust is built...
Linux Cryptocurrency Mining Attacks Enhanced via CHAOS RAT
Linux Cryptocurrency Mining Attacks Enhanced via CHAOS RATWe intercepted a cryptocurrency mining attack that incorporated an advanced remote access trojan (RAT) named the CHAOS Remote Administrative...
Linux Cryptocurrency Mining Attacks Enhanced via CHAOS RAT
Linux Cryptocurrency Mining Attacks Enhanced via CHAOS RATWe intercepted a cryptocurrency mining attack that incorporated an advanced remote access trojan (RAT) named the CHAOS Remote Administrative...







