-
Integrating Cybersecurity in UX design
PRIVACY PRIVACY The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Image Source: Pexels Integrating Cybersecurity in UX design The digital landscape has ensured a wider range of businesses has access to…
-
North Carolina Business Magnate Indicted in $2bn Fraud Case
PRIVACY PRIVACY Insurance company owner alleged to have skimmed off millions Read More
-
Governments Targeted by Discord-Based Threat Campaign
PRIVACY PRIVACY Threat actor delivers multiple malware types via PureCrypter Read More
-
Cybersecurity in wartime: how Ukraine’s infosec community is coping
PRIVACY PRIVACY Whenever shells rain down on Ukraine, Yuriy Gatupov’s colleagues put a ‘+’ sign in a chat room. Then, the pluses are counted. “We check if everybody is alive,” he says. Gatupov, the owner of two cybersecurity companies, says it is vital to stay connected during a time of war. With Russia now controlling…
-
Police Arrest Trio in Multimillion-Dollar Extortion Case
PRIVACY PRIVACY Men are accused of stealing data on tens of millions of victims Read More
-
When Low-Tech Hacks Cause High-Impact Breaches
PRIVACY PRIVACY Web hosting giant GoDaddy made headlines this month when it disclosed that a multi-year breach allowed intruders to steal company source code, siphon customer and employee login credentials, and foist malware on customer websites. Media coverage understandably focused on GoDaddy’s admission that it suffered three different cyberattacks over as many years at the…
-
The cloud’s worst kept secret? Vulnerabilities
PRIVACY PRIVACY Graham Cluley Security News is sponsored this week by the folks at Sysdig. Thanks to the great team there for their support! The unmanageable number of vulnerabilities in the cloud is the worst-kept secret. The Sysdig 2023 Cloud-Native Security and Usage report found that 87% of container images have high or critical vulnerabilities!…
-
Friday Squid Blogging: Squid Processing Facility
PRIVACY PRIVACY This video of a modern large squid processing ship is a bit gory, but also interesting. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Read More
-
US warns of cyberattacks by Russia on anniversary of Ukraine war
PRIVACY PRIVACY The US Cybersecurity and Infrastructure Security Agency has issued an advisory urging organizations to increase cybersecurity vigilance today, the anniversary of Russia’s invasion of Ukraine, in the wake of a cyberattack against several Ukrainian government websites. “The United States and European nations may experience disruptive and defacement attacks against websites in an attempt…
-
Who’s Behind the Botnet-Based Service BHProxies?
PRIVACY PRIVACY A security firm has discovered that a six-year-old crafty botnet known as Mylobot appears to be powering a residential proxy service called BHProxies, which offers paying customers the ability to route their web traffic anonymously through compromised computers. Here’s a closer look at Mylobot, and a deep dive into who may be responsible…