German shipbuilder Lürssen, known for making super yachts for the exorbitantly wealthy, experienced a ransomware attack over Easter weekend that has incapacitated operations. With a high...
The Internet Reform Trilemma
In policy circles, we often hear about the need for a “free,” “open,” and “secure” Internet. This was most recently the case with the White House’s...
Majority of US IT Pros Told to Keep Quiet About Data Breaches
While an increasingly number of regulations have made the reporting of data breaches mandatory, a majority of IT professionals in the United States say they have...
Legion Malware Marches onto Web Servers to Steal Credentials, Spam Mobile Users
Threat actors are selling a novel credential harvester and hacktool via a Telegram channel, which can exploit numerous Web-based services to steal credentials. It also has...
How to Define Tier-Zero Assets in Active Directory Security
Organizations trying to improve the security of their Active Directory environments face a simple problem: Attackers have too many options. The average enterprise AD environment has...
Microsoft: Phishing attack targets accountants as Tax Day approaches
Microsoft is warning of a phishing campaign targeting accounting firms and tax preparers with remote access malware allowing initial access to corporate networks. With the USA...
Microsoft: Windows LAPS is incompatible with legacy policies
Microsoft is investigating an interoperability bug between the recently added Windows Local Administrator Password Solution (LAPS) feature and legacy LAPS policies. Windows LAPS helps admins manage...
Windows 11 is getting a new ‘Presence sensing’ privacy setting
Windows 11 is getting a new privacy setting that allows users to control whether applications can detect when actively interacting with the device. This change is...
Microsoft shares fix for Outlook issue blocking access to emails
Microsoft is working on fixing an issue affecting some Outlook for Microsoft 365 customers and preventing them from accessing emails and their calendars. “After updating to...
Dutch Police mails RaidForums members to warn they’re being watched
Dutch Police is sending emails to former RaidForums members, asking them to delete stolen data and stop illegal cyber activities and warning that they are not...
Five arrested after 33,000 victims lose $98M to online investment fraud
Europol and Eurojust announced today the arrest of five individuals believed to be part of a massive online investment fraud ring with at least 33,000 victims who...
Russian hackers linked to widespread attacks targeting NATO and EU
Poland’s Military Counterintelligence Service and its Computer Emergency Response Team have linked APT29 state-sponsored hackers, part of the Russian government’s Foreign Intelligence Service (SVR), to widespread...
WhatsApp boosts defense against account takeover via malware
WhatsApp announced today the introduction of several new security features, one of them dubbed “Device Verification” and designed to provide better protection against account takeover (ATO)...
Legion: New hacktool steals credentials from misconfigured sites
A new Python-based credential harvester and SMTP hijacking tool named ‘Legion’ is being sold on Telegram that targets online email services for phishing and spam attacks....
Windows Admins Warned About a Critical MSMQ QueueJumper Vulnerability
Security researchers and experts warn Windows admins about a critical vulnerability discovered in the Windows Message Queuing (MSMQ) middleware service, that can expose hundreds of thousands...
Ransomware Attack Shuts Down KFC and Pizza Hut Brand Owner`s Restaurants (Update)
Yum! recently disclosed that employees` data were exfiltrated in the January 2023 cyberattack. On January 18th, Yum! Brands closed almost 300 of its restaurants in the...
Google Play threats on the dark web are big business
Android infections are also prevalent on the dark web, according to Kaspersky. Learn how to keep your workforce safe from these mobile and BYOD security threats....
Bypassing a Theft Threat Model
Thieves cut through the wall of a coffee shop to get to an Apple store, bypassing the alarms in the process. I wrote about this kind...
What are the cybersecurity concerns of SMBs by sector?
Some sectors have high confidence in their in-house cybersecurity expertise, while others prefer to enlist the support of an external provider to keep their systems and...
Former TSB chief information officer fined £81,000 over IT meltdown in 2018
UK regulators have imposed an £81,000 fine on a former TSB information officer over the bank’s IT meltdown in 2018 that left millions of customers locked...
GuLoader Targets US Financial Firms With Tax-Themed Phishing Lures
A malware loader known as GuLoader has been observed targeting the US financial sector using phishing emails with a tax-themed lure. Security researchers at eSentire shared...
Fortinet fixed a critical vulnerability in its Data Analytics product
Fortinet addressed a critical vulnerability that can lead to remote, unauthenticated access to Redis and MongoDB instances. Fortinet has addressed a critical vulnerability, tracked as CVE-2022-41331...
How to Combat Insider Threats
Knowing that insider threats are a risk is one thing. Knowing how to fight them off is entirely another. Dealing with issues of insider cyber risk...
Hyundai suffered a data breach that impacted customers in France and Italy
Hyundai disclosed a data breach that impacted Italian and French car owners and clients who booked a test drive. Hyundai has suffered a data breach that...
QuaDream surveillance firm’s spyware targeted iPhones with zero-click exploit
At least five members of civil society worldwide have been targeted with spyware and exploits developed by surveillance firm QuaDream. Citizen Lab researchers reported that at...
Smashing Security podcast #317: Another Uber SNAFU, an AI chatbot quiz, and is juice-jacking genuine?
Everyone’s talking juice-jacking – but has anyone ever been juice-jacked? Uber suffers yet another data breach, but it hasn’t been hacked. And Carole hosts the “AI-a-go-go...
Plenty of juice-jacking scare stories, but precious little juice-jacking
Travellers are being told to be wary when plugging their smartphones and laptops into USB chargers. On Thursday last week, the official Twitter account of the...
Google Tackles Open Source Security With New Dependency Service
In a bid to reduce software supply chain risks in the open source software ecosystem, Google launched a free API service providing dependency data and security-related...
Menlo Security Illustrates Importance of Browser Security as 4 in 5 Ransomware Attacks Include Threats Beyond Data Encryption
MOUNTAIN VIEW, Calif., April 11, 2023 – Menlo Security, a leader in browser security, today shared results from the CyberEdge Group’s 10th Annual Cyberthreat Defense Report (CDR). This year’s...
VulnCheck Named CVE Numbering Authority for Common Vulnerabilities and Exposures
LEXINGTON, Mass.–(BUSINESS WIRE)–VulnCheck, the vulnerability intelligence company, today announced it has been authorized by the CVE Program as a CVE Numbering Authority (CNA). The company also announced the launch of VulnCheck...




























