How Ozempic Scams Put People’s Finances and Health at Risk
As pharmacies each week fill more than one million prescriptions for Ozempic and other GLP-1 weight loss drugs, scammers are cashing in on the demand....
WithSecure Reveals Mass Exploitation of Edge Software and Infrastructure Appliances
In a new report, WithSecure found that higher severity vulnerabilities in edge services and infrastructure devices are rising fast Read More
Scattered Spider Now Affiliated with RansomHub Following BlackCat Exit
GuidePoint has assessed with high confidence that the notorious Scattered Spider group has become an affiliate of RaaS operator RansomHub Read More
70% of Cybersecurity Pros Often Work Weekends, 64% Looking for New Jobs
Bitdefender found that 70% of cybersecurity professionals often have to work weekends to address security concerns at their organization Read More
Chinese Hackers Leveraging ‘Noodle RAT’ Backdoor
The ELF backdoor, initially thought to be a variant of existing malware, has a Windows and a Linux version Read More
Battered and bruised 23andMe faces probe after hack that stole seven million users’ data
23andMe, the California-based company which sells DNA testing kits to help people learn about their ancestry and potential health risks, is facing scrutiny from British...
Using AI for Political Polling
Public polling is a critical function of modern political campaigns and movements, but it isn’t what it once was. Recent US election cycles have produced...
Social Media Cybersecurity: Don’t Let Employees Be Your Weakest Link
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information...
Microsoft Patches One Critical and One Zero-Day Vulnerability
June Patch Tuesday sees Microsoft fix over 50 bugs, including one already publicly disclosed Read More
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe...