News

  • MIT Publishes Framework to Evaluate Cybersecurity Methods

    PRIVACY PRIVACY It assesses information hackers could get from a victim program protected by an obfuscation scheme Read More

    Read More

  • Charming Kitten’s PowerStar Malware Evolves with Advanced Techniques

    PRIVACY PRIVACY Volexity said the updated malware uses IPFS, public cloud hosting for decryption and configuration Read More

    Read More

  • Redacting Documents with a Black Sharpie Doesn’t Work

    PRIVACY PRIVACY We have learned this lesson again: As part of the FTC v. Microsoft hearing, Sony supplied a document from PlayStation chief Jim Ryan that includes redacted details on the margins Sony shares with publishers, its Call of Duty revenues, and even the cost of developing some of its games. It looks like someone…

    Read More

  • LockBit Dominates Ransomware World, New Report Finds

    PRIVACY PRIVACY LockBit becomes one of the first major ransomware operations to specifically target macOS Read More

    Read More

  • Over 1500 gas stations disrupted in Canada, after energy giant hacked

    PRIVACY PRIVACY Suncor, one of the largest energy companies in North America, has suffered a cyber attack that left Canadian motorists unable to make gas station purchases with payment cards, and even disabled car washes. Read more in my article on the Hot for Security blog. Read More

    Read More

  • VPN and RDP Exploitation the Most Common Attack Technique

    PRIVACY PRIVACY Initial access brokers still play a key role in threat supply chain Read More

    Read More

  • Stories from the SOC: Fighting back against credential harvesting with ProofPoint

    PRIVACY PRIVACY Executive summary Credential harvesting is a technique that hackers use to gain unauthorized access to legitimate credentials using a variety of strategies, tactics, and techniques such as phishing and DNS poisoning. Phishing is the most frequent type of cyber threat and can lead to more harmful attacks such as ransomware and credential harvesting.…

    Read More

  • US Prosecutors Line Up Charges in $2.5bn Healthcare Fraud Cases

    PRIVACY PRIVACY Nearly 80 individuals accused of participating in multiple schemes Read More

    Read More

  • Japan in the Crosshairs of Many State-Sponsored Threat Actors New Report Finds

    PRIVACY PRIVACY Rapid7 found that Vietnamese APTs have also been targeting Japanese organizations, especially competitors of Vietnam’s budding automotive industry Read More

    Read More

  • Manifest Confusion Threat Undermines Trust in Entire Npm Registry

    PRIVACY PRIVACY Former manager takes registry to task for slow response Read More

    Read More

News, Advisories and much more

Exit mobile version