“Fake crypto millionaire” charged with alleged $1.7M cryptomining scam
A self-proclaimed cryptocurrency millionaire has been charged with multiple felonies for his alleged role in a scam that purported to sell a high-powered cryptomining machine...
Come to the National Information Security Conference in October, and see Smashing Security LIVE!
Between 5-7 October, I will be chairing the UK's National Information Security Conference (better known as NISC), at Carden Park in Cheshire. It's a great...
Leaking Screen Information on Zoom Calls through Reflections in Eyeglasses
Okay, it’s an obscure threat. But people are researching it: Our models and experimental results in a controlled lab setting show it is possible to...
Cybersecurity Snapshot: 6 Things That Matter Right Now
Topics that are top of mind for the week ending Sept. 23 | A digital trust disconnect between theory and practice | Don’t ignore attack...
Seven-Year Mobile Surveillance Campaign Targets Uyghurs
Scarlet Mimic group uses over 20 Android malware variants Read More
NSA Reveals “Hackers’ Playbook” for OT Attacks
New report outlines key mitigations for OT owners Read More
Europol “Hackathon” Identifies Scores of Human Trafficking Victims
Over 100 online platforms checked for illegal activity Read More
A third of Australian population likely affected in Optus cyberattack
Australia’s second largest telecommunications provider, Optus, revealed it suffered a cyberattack where data from customers have possibly been accessed. However, the company claims the attack...
CVE-2020-36604
hoek before 8.5.1 and 9.x before 9.0.3 allows prototype poisoning in the clone function. Read More
ZDI-22-1296: Trend Micro Deep Security Link Following Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Deep Security. An attacker must first obtain the ability to execute...