News

  • The hidden security risks in tech layoffs and how to mitigate them

    PRIVACY PRIVACY In the shadowy corners of the tech world, there are plenty of stories of admins locking organizations out of their own IT environment, greedy employees selling data, or security engineers backdooring the network. The motivations for these acts can touch on anything from financial gain to revenge, and the consequences are generally disastrous…

    Read More

  • Friday Squid Blogging: More Squid Camouflage Research

    PRIVACY PRIVACY Here’s a research group trying to replicate squid cell transparency in mammalian cells. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Read More

    Read More

  • Hacking the Layoff Process

    PRIVACY PRIVACY My latest book, A Hacker’s Mind, is filled with stories about the rich and powerful hacking systems, but it was hard to find stories of the hacking by the less powerful. Here’s one I just found. An article on how layoffs at big companies work inadvertently suggests an employee hack to avoid being…

    Read More

  • Cybercrime group FIN7 targets Veeam backup servers

    PRIVACY PRIVACY Researchers warn that a financially motivated cybercrime group known as FIN7 is compromising Veeam Backup & Replication servers and deploying malware on them. It’s not yet clear how attackers are breaking into the servers, but a possibility is that they’re taking advantage of a vulnerability patched in the popular enterprise data replication solution…

    Read More

  • Ransomware Attack Disrupts IT Network at Hardenhuish School

    PRIVACY PRIVACY At the time of writing, it is unclear whether the school paid the ransom Read More

    Read More

  • Minecraft clones stealthily load ads on millions of Android devices

    PRIVACY PRIVACY Boffins at McAfee have identified 38 Android apps in the Google Play store that unashamedly rip off the ever-popular gaming sensation Minecraft, but are actually designed to stealthily earn advertising revenue. Read More

    Read More

  • Global Cyber Attacks Rise by 7% in Q1 2023

    PRIVACY PRIVACY Check Point also said the education and research sector experienced the highest number of attacks Read More

    Read More

  • Android Apps Fail to Protect User Data During Device Transfer

    PRIVACY PRIVACY CloudSEK said that in some applications such as WhatsApp, attackers could also bypass 2FA Read More

    Read More

  • 5 ways threat actors can use ChatGPT to enhance attacks

    PRIVACY PRIVACY The Cloud Security Alliance (CSA) has revealed five ways malicious actors can use ChatGPT to enhance their attack toolset in a new report exploring the cybersecurity implications of large language models (LLMs). The Security Implications of ChatGPT paper details how threat actors can exploit AI-driven systems in different aspects of cyberattacks including enumeration,…

    Read More

  • Man Gets Four Years for Stealing Bitcoins Seized by Feds

    PRIVACY PRIVACY Individual stole millions subject to forfeiture Read More

    Read More

News, Advisories and much more

Exit mobile version