News

  • Npm Packages Used to Distribute Phishing Links

    PRIVACY PRIVACY The malicious packages were reportedly created using automated processes Read More

    Read More

  • A Device to Turn Traffic Lights Green

    PRIVACY PRIVACY Here’s a story about a hacker who reprogrammed a device called “Flipper Zero” to mimic Opticom transmitters—to turn traffic lights in his path green. As mentioned earlier, the Flipper Zero has a built-in sub-GHz radio that lets the device receive data (or transmit it, with the right firmware in approved regions) on the…

    Read More

  • Backdoor deployment overtakes ransomware as top attacker action

    PRIVACY PRIVACY Deployment of backdoors on networks was the top action attackers made in almost a quarter of all incidents remediated in 2022. A spike in the use of the multi-purpose Emotet malware early in the year was the main culprit of this increase, accounting for 47% of backdoors deployed throughout the year, according to…

    Read More

  • HardBit ransomware tells corporate victims to share their cyber insurance details

    PRIVACY PRIVACY A ransomware outfit is advising its victims to secretly tell them how much insurance they have, so their extortion demands will be met. Read more in my article on the Tripwire State of Security blog. Read More

    Read More

  • Governance of Zero Trust in manufacturing

    PRIVACY PRIVACY Manufacturers are some of the most ambitious firms on the planet when it comes to harnessing the power of edge technology to modernize their businesses. As they make plans in 2023 to     enhance business outcomes through the use of technologies such as 5G and IoT, manufacturers should also increasingly be called to innovate in…

    Read More

  • Putin Speech Interrupted by DDoS Attack

    PRIVACY PRIVACY Outage impacts Russian state media websites Read More

    Read More

  • Time Taken to Deploy Ransomware Drops 94%

    PRIVACY PRIVACY Extortion found to be most common impact from cyber-attacks in 2022 Read More

    Read More

  • What is Traffic Light Protocol? Here’s how it supports CISOs in sharing threat data

    PRIVACY PRIVACY Traffic Light Protocol (TLP) was created to facilitate greater sharing of potentially sensitive threat information within an organization or business and to enable more effective collaboration among security defenders, system administrators, security managers, and researchers. TLP grew out of efforts by various public-sector security incident response teams of various nations that began sharing…

    Read More

  • Call of Duty Developer Confirms Phishing Attempt but Not Breach

    PRIVACY PRIVACY Security researchers say hackers successfully exfiltrated content Read More

    Read More

  • New Privilege Escalation Bug Class Found on macOS and iOS

    PRIVACY PRIVACY The new class of privilege escalation bugs is based on the ForcedEntry attack Read More

    Read More

News, Advisories and much more

Exit mobile version