-
Smashing Security podcast #331: Boris Johnson’s WhatsApps, and sextorting party girls
PRIVACY PRIVACY Former Prime Minister Boris Johnson wants to hand over his WhatsApp messages – or does he? And a couple of fun-loving girls from Aberdeen have come up with a sinister twist on sextortion scams. All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham…
-
Practice Your Security Prompting Skills
PRIVACY PRIVACY Gandalf is an interactive LLM game where the goal is to get the chatbot to reveal its password. There are eight levels of difficulty, as the chatbot gets increasingly restrictive instructions as to how it will answer. It’s a great teaching tool. I am stuck on Level 7. Feel free to give hints…
-
Chinese APT41 Linked to WyrmSpy and DragonEgg Surveillanceware
PRIVACY PRIVACY Lookout attributed WyrmSpy and DragonEgg to APT41 due to overlapping Android signing certificates Read More
-
Critical API Security Gaps Found in Financial Services
PRIVACY PRIVACY The Salt Security report also notes a 244% surge in unique attackers between H1 and H2 2022 Read More
-
How Cyber Threat Intelligence Practitioners Should Leverage Automation and AI
PRIVACY PRIVACY The Cyber Threat Intelligence Summit discussed how automation and generative AI could help CTI practitioners tackle the overload of data they have to process Read More
-
Biden-Harris Administration Unveils Smart Device Cyber Program
PRIVACY PRIVACY The criteria for certification are set to be based on cybersecurity guidelines published by NIST Read More
-
Mobile Spyware: How Hackers Can Turn Your Phone Into a Stalking Machine
PRIVACY PRIVACY Some crooks and shady characters will invade your privacy simply by asking for your permission to snoop—through invasive apps you install on your phone. Invasive apps look like legitimate apps, yet they have an ulterior motive. They use a phone’s permission settings to spy on its user by accessing the phone’s camera, microphone,…
-
Industry Experts Urge CISA to Update Secure by Design Guidance
PRIVACY PRIVACY A letter authored by industry experts says that CISA should include specific details on how to implement security-by-design through threat modeling Read More
-
Scam Job Offers Target Uni Students
PRIVACY PRIVACY Threat actors exploit high cost of living Read More
-
NCA: Nation States Using Cybercrime Groups as Proxies
PRIVACY PRIVACY Crime agency chief warns of surging online threat Read More