Western Digital disclosed a security breach, according to the company an unauthorized party gained access to multiple systems. Western Digital has shut down several of its...
Microsoft fixed Azure AD bug that led to Bing.com results manipulation and account takeover
Microsoft addressed a misconfiguration flaw in the Azure Active Directory (AAD) identity and access management service. Microsoft has addressed a misconfiguration issue impacting the Azure Active...
Moobot botnet spreads by targeting Cacti and RealTek flaws
The Moobot botnet is actively exploiting critical vulnerabilities in Cacti, and Realtek in attacks in the wild. FortiGuard Labs researchers observed an ongoing hacking campaign targeting...
Key takeaways from ESET’s new APT Activity Report – Week in security with Tony Anscombe
As our latest APT Activity Report makes abundantly clear, the threat of cyberespionage and stealthy attacks remains very real The threat of cyberespionage and stealthy cyberattacks...
Are online surveys legit and safe? Watch out for survey scams
“Can I tell a legitimate survey apart from a fake one?” is the single most important question you need to answer for yourself before taking any...
Less is more: Conquer your digital clutter before it conquers you
Lose what you don’t use and other easy ways to limit your digital footprint and strengthen your online privacy and security In case you missed it,...
ESET APT Activity Report T3 2022
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T3 2022 31 Jan 2023 – 11:30AM An overview of...
Are you in control of your personal data? – Week in security with Tony Anscombe
Data Privacy Week is a reminder to protect your data – all year round. Here are three privacy-boosting habits you can start today. Every action we...
SwiftSlicer: New destructive wiper malware strikes Ukraine
Sandworm continues to conduct attacks against carefully chosen targets in the war-torn country ESET researchers have uncovered a new wiper attack in Ukraine that they attribute to...
Why your data is more valuable than you may realize
The data trail you leave behind whenever you’re online is bigger – and more revealing – than you may think “The lampposts are listening to me;...
Mastodon vs. Twitter: Know the differences
Looking for an alternative to Twitter and thinking about joining the folks flocking to Mastodon? Here’s how the two platforms compare to each other. From restructuring...
5 valuable skills your children can learn by playing video games
Gaming can help your children build and sharpen a range of life skills that will stand them in good stead in the future Videogames are now...
Hybrid play: Leveling the playing field in online video gaming and beyond
Does VALORANT’s approach to cheating signal a turning point in how we deal with the continued hacks afflicting our hybrid world of work and play? First...
Ransomware payments down 40% in 2022 – Week in security with Tony Anscombe
Ransomware revenue plunges to $456 million in 2022 as more victims refuse to pay up. Here’s what to make of the trend. Ransomware gangs extorted at...
Credit card fraud: Why should you care?
By Dr. Ken Knapton, CIO Progrexion. Credit card fraud continues to be a significant concern for both consumers and businesses. Not only can it result in...
Endpoint security: Challenges, solutions and best practices
By Anas Baig, product manager and cyber security expert with Securiti. Doing business in the public sphere leaves entities open to malicious attacks. A study conducted...
GUEST ESSAY: The role advanced ‘VM’ is ideally suited to play in combating modern cyber attacks
By Chandrashekhar Basavanna Modern cyber attacks are ingenious — and traditional vulnerability management, or VM, simply is no longer very effective. Related: Taking a risk-assessment approach...
Microsoft Addresses a New Azure AD Vulnerability Affecting Bing Search & Key Apps
Microsoft has patched a misconfiguration issue affecting the Azure Active Directory (AAD) identity and access management service that allowed unauthorized access to many “high-impact” applications. The...
Elementor Pro Vulnerability Actively Exploited by Threat Actors
Threat actors are actively exploiting a high-severity vulnerability discovered in the popular plugin Elementor Pro. Elementor Pro is a WordPress page builder plugin with multiple functions...
Money Message: The Newest Ransomware Gang that Threatens Organizations
A new online threat actor has emerged: the Money Message ransomware gang. These cybercriminals are attacking companies all over the world, demanding millions of dollars in...
SCCM Alternative for Patch Management
In today’s cybersecurity space, properly patching the machines and servers in your company can make the difference between a well-secured organization and a vulnerable one. SCCM...
Cybersecurity unaligned with business goals is reactive … and flawed: Study
A new report for cybersecurity firm WithSecure suggests that most companies are investing in security solutions that are tactical and reactive, but not in line with...
BYOD and personal apps: A recipe for data breaches
Some 43% of employees have been targeted with work-related phishing attacks on their personal devices, says a survey from SlashNext. Image: Adobe Stock Employees might feel...
A Serial Tech Investment Scammer Takes Up Coding?
John Clifton Davies, a 60-year-old con man from the United Kingdom who fled the country in 2015 before being sentenced to 12 years in prison for...
The hidden danger to zero trust: Excessive cloud permissions
Graham Cluley Security News is sponsored this week by the folks at Sysdig. Thanks to the great team there for their support! What is one of...
aCropalypse now! Cropped and redacted images suffer privacy fail on Google Pixel smartphones
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
Free decryptor released for Conti-based ransomware following data leak
Security researchers have released a new decryption tool that should come to the rescue of some victims of a modified version of the Conti ransomware, helping...
Android phones can be hacked just by someone knowing your phone number
Well, this isn’t good. Google has issued a warning that some Android phones can be hacked remotely, without the intended victim having to click on anything....
Smashing Security podcast #313: Tesla twins and deepfake dramas
The twisted tale of the two Teslas, and a deepfake sandwich. All this and more is discussed in the latest edition of the “Smashing Security” podcast...
Microsoft has another go at closing security hole exploited by Magniber ransomware
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...