News

  • Smashing Security podcast #331: Boris Johnson’s WhatsApps, and sextorting party girls

    PRIVACY PRIVACY Former Prime Minister Boris Johnson wants to hand over his WhatsApp messages – or does he? And a couple of fun-loving girls from Aberdeen have come up with a sinister twist on sextortion scams. All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham…

    Read More

  • Practice Your Security Prompting Skills

    PRIVACY PRIVACY Gandalf is an interactive LLM game where the goal is to get the chatbot to reveal its password. There are eight levels of difficulty, as the chatbot gets increasingly restrictive instructions as to how it will answer. It’s a great teaching tool. I am stuck on Level 7. Feel free to give hints…

    Read More

  • Chinese APT41 Linked to WyrmSpy and DragonEgg Surveillanceware

    PRIVACY PRIVACY Lookout attributed WyrmSpy and DragonEgg to APT41 due to overlapping Android signing certificates Read More

    Read More

  • Critical API Security Gaps Found in Financial Services

    PRIVACY PRIVACY The Salt Security report also notes a 244% surge in unique attackers between H1 and H2 2022 Read More

    Read More

  • How Cyber Threat Intelligence Practitioners Should Leverage Automation and AI

    PRIVACY PRIVACY The Cyber Threat Intelligence Summit discussed how automation and generative AI could help CTI practitioners tackle the overload of data they have to process Read More

    Read More

  • Biden-Harris Administration Unveils Smart Device Cyber Program

    PRIVACY PRIVACY The criteria for certification are set to be based on cybersecurity guidelines published by NIST Read More

    Read More

  • Mobile Spyware: How Hackers Can Turn Your Phone Into a Stalking Machine

    PRIVACY PRIVACY Some crooks and shady characters will invade your privacy simply by asking for your permission to snoop—through invasive apps you install on your phone. Invasive apps look like legitimate apps, yet they have an ulterior motive. They use a phone’s permission settings to spy on its user by accessing the phone’s camera, microphone,…

    Read More

  • Industry Experts Urge CISA to Update Secure by Design Guidance

    PRIVACY PRIVACY A letter authored by industry experts says that CISA should include specific details on how to implement security-by-design through threat modeling Read More

    Read More

  • Scam Job Offers Target Uni Students

    PRIVACY PRIVACY Threat actors exploit high cost of living Read More

    Read More

  • NCA: Nation States Using Cybercrime Groups as Proxies

    PRIVACY PRIVACY Crime agency chief warns of surging online threat Read More

    Read More

News, Advisories and much more

Exit mobile version