End-to-end encrypted email service provider ProtonMail has drawn criticism after it ceded to a legal request and shared the IP address of anti-gentrification activists with law enforcement authorities, leading...
CSOonline – China’s PIPL privacy law imposes new data handling requirements
The Personal Information Protection Law will force global companies doing business in China to be more careful with cross-border flow of personal information. As part of...
CSOonline – Critical flaw in Atlassian Confluence actively exploited
The remote code execution vulnerability was recently patched for affected versions of Atlassian Confluence Server and Data Center; users are advised to apply the patch or...
CSOonline – The T-Mobile data breach: A timeline
Telecommunications giant T-Mobile warns data belonging to some 50 million individuals has been exposed. Here is a timeline of the data breach and its ramifications. Telecommunications...
welivesecurity – A parent’s guide to smartphone security
Smartphones are kids’ trusty companions both in- and outside the classroom, and as they return to their desks, we’ve prepared some handy tips on how to...
DARKreading – DDoS Attacks Hitting Victims in High-Bandwidth ‘Bursts’
The volume of traffic harnessed by attackers has grown steadily over the years, with distributed denial-of-service attacks regularly topping hundreds of gigabytes per second. Imperva, “Global...
thehackernews – FIN7 Hackers Using Windows 11 Themed Documents to Drop Javascript Backdoor
A recent wave of spear-phishing campaigns leveraged weaponized Windows 11 Alpha-themed Word documents with Visual Basic macros to drop malicious payloads, including a JavaScript implant, against...
DARKreading – CISA Launches JCDC, the Joint Cyber Defense Collaborative
“We can’t do this alone,” the new CISA director told attendees in a keynote at Black Hat USA today. BLACK HAT USA 2021 – Las Vegas – Jen Easterly, the...
welivesecurity – Twitter introduces new feature to automatically block abusive behavior
Dubbed Safety Mode, the feature will temporarily block authors of offensive tweets from being able to contact or follow users. Twitter has unveiled a new feature...
nakedsecurity – Big bad decryption bug in OpenSSL – but no cause for alarm
The well-known and widely-used encryption library OpenSSL released a security patch earlier this week. Annoyingly for those who like lean, modern, sans serif typefaces, the new version is OpenSSL...
nakedsecurity – Skimming the CREAM – recursive withdrawals loot $13M in cryptocash
You must have had that happy feeling (happiest of all when it’s still a day or two to payday and you know that your balance is...
C-Level Executives Should Stay Away From These 6 Cybersecurity Myths
The C-suite in any organisation is entrusted with the responsibility of spearheading innovation, progress, and company direction. Additionally, C-level executives hold a greater responsibility in maintaining...
BBC News – WhatsApp issued second-largest GDPR fine of €225m
WhatsApp has been fined €225m (£193m) by Ireland’s data watchdog for breaching privacy regulations. It is the largest fine ever from the Irish Data Protection Commission,...
thehackernews – Chinese Authorities Arrest Hackers Behind Mozi IoT Botnet Attacks
The operators of the Mozi IoT botnet have been taken into custody by Chinese law enforcement authorities, nearly two years after the malware emerged on the...
thehackernews – CISA Adds Single-Factor Authentication to the List of Bad Practices
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added single-factor authentication to the short list of “exceptionally risky” cybersecurity practices that could expose critical infrastructure as...
Cisco Security Blog – Anatomy of a Breach: Preventing the Next Advanced Attack by Nirav Shah
Your company’s stock price nosedives by 15% in a single day. You get a flood of messages from concerned family and friends about your company. Your...
Cisco Security Blog – The Risk-Conscious, Security-Aware Culture: The Forgotten Critical Security Control
Chief Information Security Officers (CISOs) across the Global 2000 and Fortune 1000 are obsessed with protecting the workforce endpoints as critical vulnerabilities in the cybersecurity and...
The Hacker News – Interpol Arrests Moroccan Hacker Engaged in Nefarious Cyber Activities
Law enforcement authorities with the Interpol have apprehended a threat actor responsible for targeting thousands of unwitting victims over several years and staging malware attacks on...
threatpost – Lazarus Targets Job-Seeking Engineers with Malicious Documents
Notorious North Korean APT impersonates Airbus, General Motors and Rheinmetall to lure potential victims into downloading malware. The notorious Lazarus advanced persistent threat (APT) group has been identified...
threatpost – Baby Clothes Giant Carter’s Leaks 410K Customer Records
Purchase automation software delivered shortened URLs without protections. Baby clothes retailer Carter’s inadvertently exposed the personal data of hundreds of thousands of its customers, dating back...
threatpost – Volkswagen Vendor Exposed Data of 3.3m Drivers
Nearly all of the leaked data was for owners or wannabe owners of the automaker’s luxury brand of Audis, now at greater risk for phishing, ransomware...
The Hacker News – Instagram Bug Allowed Anyone to View Private Accounts Without Following Them (resolved now).
Author: Ravie Lakshmanan Instagram has patched a new flaw that allowed anyone to view archived posts and stories posted by private accounts without having to follow...
The Hacker News – Chinese Hackers Believed to be Behind Second Cyberattack on Air India
Even as a massive data breach affecting Air India came to light the previous month, India’s flag carrier airline appears to have suffered a separate cyber...
The Register – PrivacyMic looks to keep your home smart without Google, Alexa, Siri and pals listening in
Raspberry Pi-powered prototype proves 95% accurate, 100% private, claim boffins Researchers at the University of Michigan have proposed a way to have your privacy cake and...
The Hacker News – 7-Year-Old Polkit Flaw Lets Unprivileged Linux Users Gain Root Access
7-Year-Old Polkit Flaw Lets Unprivileged Linux Users Gain Root Access A seven-year-old privilege escalation vulnerability discovered in the polkit system service could be exploited by a...
The Hacker News – Hackers Can Exploit Samsung Pre-Installed Apps to Spy On Users
Hackers Can Exploit Samsung Pre-Installed Apps to Spy On Users Multiple critical security flaws have been disclosed in Samsung’s pre-installed Android apps, which, if successfully exploited,...
threatpost – ‘Fancy Lazarus’ Cyberattackers Ramp up Ransom DDoS Efforts
‘Fancy Lazarus’ Cyberattackers Ramp up Ransom DDoS Efforts The group, known for masquerading as various APT groups, is back with a spate of attacks on U.S....
threatpost – DarkSide Pwned Colonial With Old VPN Password
Attackers accessed a VPN account that was no longer in use to freeze the company’s network in a ransomware attack whose repercussions are still vibrating. It...





























