Data Breaches: What They Are, Why They Occur, and How to Prevent ThemData breaches are invaluable to understanding a threat actor’s goals and motivations. Often fueled...
Meta outlines US involvement in social media disinformation in new report
Meta outlines US involvement in social media disinformation in new reportMeta outlines US involvement in social media disinformation in new report A report released by Meta’s...
Apple’s “imprecise” Blue Circle on Map Used by Police to Violently Target and Abuse Innocent Retired Woman
Apple’s “imprecise” Blue Circle on Map Used by Police to Violently Target and Abuse Innocent Retired WomanAn iPhone owner sent the asset protection forces of America...
Dissecting the cyber incident at All India Institute of Medical Sciences (AIIMS)
Dissecting the cyber incident at All India Institute of Medical Sciences (AIIMS) The news of the All India Institute of Medical Sciences (AIIMS) servers being breached is...
Decentralized Cyber security – An Advanced Approach
Decentralized Cyber security – An Advanced ApproachINTRODUCTION Security is getting harder to centralize as the nature of remote work changes and more businesses abandon the physical...
International police operation takes down iSpoof
International police operation takes down iSpoof Last week, an international group of law enforcement agencies took down one of the biggest criminal operators of a spoofing-as-a-service...
Meta outlines US involvement in social media disinformation in new report
Meta outlines US involvement in social media disinformation in new reportA report released by Meta’s security team describes the company’s shutdown of a network of Facebook...
Palo Alto Networks looks to shore up healthcare IoT security
Palo Alto Networks looks to shore up healthcare IoT securityPalo Alto Networks today rolled out a new Medical IoT Security offering, designed to provide improved visibility,...
Prolific Chinese Hackers Stole US COVID funds
Prolific Chinese Hackers Stole US COVID fundsSecret Service says discovery may be the tip of the icebergLeer másSecret Service says discovery may be the tip of...
Russian Hackers Use Western Networks to Attack Ukraine
Russian Hackers Use Western Networks to Attack UkraineLupovis used decoys to find out more about threat actorsLeer másLupovis used decoys to find out more about threat...
Crook sentenced to 18 months for stealing $20M in SIM swapping attack
Crook sentenced to 18 months for stealing $20M in SIM swapping attackNicholas Truglia, from Florida, US, was sentenced to 18 months in prison for stealing more...
FreeBSD Systems Exposed to Compromise Due to Ping Vulnerability
FreeBSD Systems Exposed to Compromise Due to Ping VulnerabilityThe creators of the FreeBSD operating system have released updates meant to resolve a vulnerability within the ping...
French Hospital Forced to Transfer Patients After Ransomware Attack
French Hospital Forced to Transfer Patients After Ransomware AttackA Saturday night ransomware attack forced the André-Mignot teaching hospital in the Paris outskirts to shut down its...
Hacking cars remotely with just their VIN
Hacking cars remotely with just their VINYour car's mobile app might have allowed hackers to remotely unlock your vehicle, turn on or off its engine, and...
Russian courts attacked by CryWiper malware that poses as ransomware
Russian courts attacked by CryWiper malware that poses as ransomwareRussian courts and government agencies have been hit by a previously-undocumented strain of data-wiping malware known as...
Microsoft warns of Russian cyberattacks throughout the winter
Microsoft warns of Russian cyberattacks throughout the winterMicrosoft has warned of Russian-sponsored cyberattacks continuing to target Ukrainian infrastructure and NATO allies in Europe throughout the winter. [...]Leer...
Snyk’s Iain Rose on How to Secure Cloud-Native Environments
Snyk's Iain Rose on How to Secure Cloud-Native EnvironmentsRose on Why Apps and Dev Workflows Must Embrace the Cloud's Rapid Rate of ChangeOrganizations should build apps...
Certificados para Android usados para firmar malware
Certificados para Android usados para firmar malwareTodas las apps de Android están firmadas por un certificado. Pero esto no garantiza su identidad, sino su integridad. En...
New Flaw in Acer Laptops Could Let Attackers Disable Secure Boot Protection
New Flaw in Acer Laptops Could Let Attackers Disable Secure Boot ProtectionAcer has released a firmware update to address a security vulnerability that could be potentially...
Australia Passes Bill to Fine Companies up to $50 Million for Data Breaches
Australia Passes Bill to Fine Companies up to $50 Million for Data BreachesThe Australian government has passed a bill that markedly increases the penalty for companies...
3 New Vulnerabilities Affect OT Products from German Companies Festo and CODESYS
3 New Vulnerabilities Affect OT Products from German Companies Festo and CODESYSResearchers have disclosed details of three new security vulnerabilities affecting operational technology (OT) products from...
Chinese Cyber Espionage Hackers Using USB Devices to Target Entities in Philippines
Chinese Cyber Espionage Hackers Using USB Devices to Target Entities in PhilippinesA threat actor with a suspected China nexus has been linked to a set of...
Researchers Find a Way Malicious NPM Libraries Can Evade Vulnerability Detection
Researchers Find a Way Malicious NPM Libraries Can Evade Vulnerability DetectionNew findings from cybersecurity firm JFrog show that malware targeting the npm ecosystem can evade security...
This Malicious App Abused Hacked Devices to Create Fake Accounts on Multiple Platforms
This Malicious App Abused Hacked Devices to Create Fake Accounts on Multiple PlatformsA malicious Android SMS application discovered on the Google Play Store has been found...
French Electricity Provider Fined for Storing Users’ Passwords with Weak MD5 Algorithm
French Electricity Provider Fined for Storing Users’ Passwords with Weak MD5 AlgorithmThe French data protection watchdog on Tuesday fined electricity provider Électricité de France (EDF) €600,000 for...
North Korea Hackers Using New “Dolphin” Backdoor to Spy on South Korean Targets
North Korea Hackers Using New "Dolphin" Backdoor to Spy on South Korean TargetsThe North Korea-linked ScarCruft group has been attributed to a previously undocumented backdoor called Dolphin that...
Schoolyard Bully Trojan Apps Stole Facebook Credentials from Over 300,000 Android Users
Schoolyard Bully Trojan Apps Stole Facebook Credentials from Over 300,000 Android UsersMore than 300,000 users across 71 countries have been victimized by a new Android threat...
Researchers ‘Accidentally’ Crash KmsdBot Cryptocurrency Mining Botnet Network
Researchers 'Accidentally’ Crash KmsdBot Cryptocurrency Mining Botnet NetworkAn ongoing analysis into an up-and-coming cryptocurrency mining botnet known as KmsdBot has led to it being accidentally taken down. KmsdBot,...
LastPass Suffers Another Security Breach; Exposed Some Customers Information
LastPass Suffers Another Security Breach; Exposed Some Customers InformationPopular password management service LastPass said it's investigating a second security incident that involved attackers accessing some of...
Hackers Leak Another Set of Medibank Customer Data on the Dark Web
Hackers Leak Another Set of Medibank Customer Data on the Dark WebMedibank on Thursday confirmed that the threat actors behind the devastating cyber attack have posted another dump...


