-
US and UK Sanction Seven Russian Cyber-Criminals
PRIVACY PRIVACY The seven Russian nationals are members of the notorious Trickbot malware gang Read More
-
Dark Web Market Revenues Sink 50% in 2022
PRIVACY PRIVACY Closure of Hydra has major impact on underground sales Read More
-
Bungling Optus scammer was no criminal mastermind
PRIVACY PRIVACY Perhaps the biggest punishment of all will be Dennis Su’s name being forever associated with an extraordinarily inept and cack-handed attempt to frighten people out of money. Read More
-
Mary Queen of Scots Letters Decrypted
PRIVACY PRIVACY This is a neat piece of historical research. The team of computer scientist George Lasry, pianist Norbert Biermann and astrophysicist Satoshi Tomokiyo—all keen cryptographers—initially thought the batch of encoded documents related to Italy, because that was how they were filed at the Bibliothèque Nationale de France. However, they quickly realised the letters were…
-
Smashing Security podcast #308: Jail after VPN fail, criminal messaging apps, and wolf-crying watches
PRIVACY PRIVACY When Ubiquiti suffered a hack the world assumed it was just a regular security breach, but the truth was much stranger… why are police happy that criminals keep using end-to-end encrypted messaging systems… and why is the Apple Watch being accused of crying wolf? All this and much much more is discussed in…
-
Trio Arrested in COVID PPE Fraud Probe
PRIVACY PRIVACY UK company set up to illegally profit from trade in protective equipment Read More
-
Yes, CISOs should be concerned about the types of data spy balloons can intercept
PRIVACY PRIVACY The recent kerfuffle surrounding the Chinese surveillance balloon that sailed above Canada and the United States before meeting its demise off the southeastern coast of the United States has tongues wagging and heads scratching in equal measure. While some may write this off as geopolitical shenanigans by China and nothing to fret about,…
-
How to unleash the power of an effective security engineering team
PRIVACY PRIVACY Security teams are comprised primarily of operations, compliance, and policy-related roles. Security engineering teams, on the other hand, are builders. They build services, automate processes, and streamline deployments to support the core security team and its stakeholders. Security engineering teams are typically made up of software and infrastructure engineers, architects, and product managers.…
-
New Info-Stealer Discovered as Russia Prepares Fresh Offensive
PRIVACY PRIVACY Ukraine braced for more critical infrastructure attacks Read More
-
Threat group targets over 1,000 companies with screenshotting and infostealing malware
PRIVACY PRIVACY Researchers warn that a new threat actor has been targeting over a thousand organizations since October with the goal of deploying credential-stealing malware. The attack chain also involves reconnaissance components including a Trojan that takes screenshots of the desktops of infected computers. Tracked as TA866 by researchers from security firm Proofpoint, the group’s…