-
Npm Packages Used to Distribute Phishing Links
PRIVACY PRIVACY The malicious packages were reportedly created using automated processes Read More
-
A Device to Turn Traffic Lights Green
PRIVACY PRIVACY Here’s a story about a hacker who reprogrammed a device called “Flipper Zero” to mimic Opticom transmitters—to turn traffic lights in his path green. As mentioned earlier, the Flipper Zero has a built-in sub-GHz radio that lets the device receive data (or transmit it, with the right firmware in approved regions) on the…
-
Backdoor deployment overtakes ransomware as top attacker action
PRIVACY PRIVACY Deployment of backdoors on networks was the top action attackers made in almost a quarter of all incidents remediated in 2022. A spike in the use of the multi-purpose Emotet malware early in the year was the main culprit of this increase, accounting for 47% of backdoors deployed throughout the year, according to…
-
HardBit ransomware tells corporate victims to share their cyber insurance details
PRIVACY PRIVACY A ransomware outfit is advising its victims to secretly tell them how much insurance they have, so their extortion demands will be met. Read more in my article on the Tripwire State of Security blog. Read More
-
Governance of Zero Trust in manufacturing
PRIVACY PRIVACY Manufacturers are some of the most ambitious firms on the planet when it comes to harnessing the power of edge technology to modernize their businesses. As they make plans in 2023 to enhance business outcomes through the use of technologies such as 5G and IoT, manufacturers should also increasingly be called to innovate in…
-
Putin Speech Interrupted by DDoS Attack
PRIVACY PRIVACY Outage impacts Russian state media websites Read More
-
Time Taken to Deploy Ransomware Drops 94%
PRIVACY PRIVACY Extortion found to be most common impact from cyber-attacks in 2022 Read More
-
What is Traffic Light Protocol? Here’s how it supports CISOs in sharing threat data
PRIVACY PRIVACY Traffic Light Protocol (TLP) was created to facilitate greater sharing of potentially sensitive threat information within an organization or business and to enable more effective collaboration among security defenders, system administrators, security managers, and researchers. TLP grew out of efforts by various public-sector security incident response teams of various nations that began sharing…
-
Call of Duty Developer Confirms Phishing Attempt but Not Breach
PRIVACY PRIVACY Security researchers say hackers successfully exfiltrated content Read More
-
New Privilege Escalation Bug Class Found on macOS and iOS
PRIVACY PRIVACY The new class of privilege escalation bugs is based on the ForcedEntry attack Read More