News

  • US and UK Sanction Seven Russian Cyber-Criminals

    PRIVACY PRIVACY The seven Russian nationals are members of the notorious Trickbot malware gang Read More

    Read More

  • Dark Web Market Revenues Sink 50% in 2022

    PRIVACY PRIVACY Closure of Hydra has major impact on underground sales Read More

    Read More

  • Bungling Optus scammer was no criminal mastermind

    PRIVACY PRIVACY Perhaps the biggest punishment of all will be Dennis Su’s name being forever associated with an extraordinarily inept and cack-handed attempt to frighten people out of money. Read More

    Read More

  • Mary Queen of Scots Letters Decrypted

    PRIVACY PRIVACY This is a neat piece of historical research. The team of computer scientist George Lasry, pianist Norbert Biermann and astrophysicist Satoshi Tomokiyo—all keen cryptographers—initially thought the batch of encoded documents related to Italy, because that was how they were filed at the Bibliothèque Nationale de France. However, they quickly realised the letters were…

    Read More

  • Smashing Security podcast #308: Jail after VPN fail, criminal messaging apps, and wolf-crying watches

    PRIVACY PRIVACY When Ubiquiti suffered a hack the world assumed it was just a regular security breach, but the truth was much stranger… why are police happy that criminals keep using end-to-end encrypted messaging systems… and why is the Apple Watch being accused of crying wolf? All this and much much more is discussed in…

    Read More

  • Trio Arrested in COVID PPE Fraud Probe

    PRIVACY PRIVACY UK company set up to illegally profit from trade in protective equipment Read More

    Read More

  • Yes, CISOs should be concerned about the types of data spy balloons can intercept

    PRIVACY PRIVACY The recent kerfuffle surrounding the Chinese surveillance balloon that sailed above Canada and the United States before meeting its demise off the southeastern coast of the United States has tongues wagging and heads scratching in equal measure. While some may write this off as geopolitical shenanigans by China and nothing to fret about,…

    Read More

  • How to unleash the power of an effective security engineering team

    PRIVACY PRIVACY Security teams are comprised primarily of operations, compliance, and policy-related roles. Security engineering teams, on the other hand, are builders. They build services, automate processes, and streamline deployments to support the core security team and its stakeholders. Security engineering teams are typically made up of software and infrastructure engineers, architects, and product managers.…

    Read More

  • New Info-Stealer Discovered as Russia Prepares Fresh Offensive

    PRIVACY PRIVACY Ukraine braced for more critical infrastructure attacks Read More

    Read More

  • Threat group targets over 1,000 companies with screenshotting and infostealing malware

    PRIVACY PRIVACY Researchers warn that a new threat actor has been targeting over a thousand organizations since October with the goal of deploying credential-stealing malware. The attack chain also involves reconnaissance components including a Trojan that takes screenshots of the desktops of infected computers. Tracked as TA866 by researchers from security firm Proofpoint, the group’s…

    Read More

News, Advisories and much more

Exit mobile version