News

  • GUloader Unmasked: Decrypting the Threat of Malicious SVG Files

    Authored by: Vignesh Dhatchanamoorthy In the ever-evolving landscape of cybersecurity threats, staying ahead of malicious actors requires a deep understanding of their tactics and tools. Enter GUloader, a potent weapon in the arsenal of cybercriminals worldwide. This sophisticated malware loader has garnered attention for its stealthy techniques and ability to evade detection, posing a significant…

    Read More

  • Smashing Security podcast #361: Wireless charging woe, AI romance apps, and ransomware revisited

    Your smartphone may be toast – if you use a hacked wireless charger, we take a closer look at the latest developments in the unfolding LockBit ransomware drama, and Carole dips her toe into online AI romance apps. All this and much much more is discussed in the latest edition of the “Smashing Security” podcast…

    Read More

  • How to interpret the MITRE Engenuity ATT&CK® Evaluations: Enterprise

    Graham Cluley Security News is sponsored this week by the folks at Cynet. Thanks to the great team there for their support! Thorough, independent tests are a vital resource as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats to their organization. And perhaps no assessment is more widely trusted…

    Read More

  • Matthew Perry’s Twitter account hacked by cryptocurrency scammers

    Matthew Perry’s official Twitter account was hijacked by scammers this week who attempted to solicit donations from well-meaning fans of the much-loved late actor. The post asked for cryptocurrency donations “to support our mission in battling addiction.” Read more in my article on the Hot for Security blog. Read More

    Read More

  • The First Steps of Establishing Your Cloud Security Strategy

    You’ve migrated to the cloud, which means it’s time to focus on cloud security. Here are some first steps to begin enacting your cloud security strategy. Read More

    Read More

  • FBI Issues Alert on Russian Threats Targeting Ubiquiti Routers

    The routers were hijacked to steal credentials, proxy traffic, and host phishing pages and custom tools Read More

    Read More

  • Calendar Meeting Links Used to Spread Mac Malware

    Malicious hackers are targeting people in the cryptocurrency space in attacks that start with a link added to the target’s calendar at Calendly, a popular application for scheduling appointments and meetings. The attackers impersonate established cryptocurrency investors and ask to schedule a video conference call. But clicking the meeting link provided by the scammers prompts…

    Read More

  • 34 Million Roblox Credentials Exposed on Dark Web in Three Years

    Kaspersky reported a 231% surge in compromised accounts from 4.7 million in 2021 to 15.5 million in 2023 Read More

    Read More

  • UK Unveils Draft Cybersecurity Governance Code to Boost Business Resilience

    The UK government provided a preview of its future Cybersecurity Governance Code of Practice, which aims to be the go-to cyber guideline for UK business leaders Read More

    Read More

  • Get the AT&T Cybersecurity Insights Report: Focus on Energy and Utilities

    We’re pleased to announce the availability of the 2023 AT&T Cybersecurity Insights Report: Focus on Energy and Utilities. The report examines the edge ecosystem, surveying energy and utilities IT leaders from around the world, and provides benchmarks for assessing your edge computing plans. This is the 12th edition of our vendor-neutral and forward-looking report. Last…

    Read More

News, Advisories and much more

Exit mobile version