News

  • Freejacking Campaign By PurpleUrchin Bypasses Captchas

    PRIVACY PRIVACY The threat actors also deployed more aggressive techniques for mining CPU resources Read More

    Read More

  • ChatGPT Used to Develop New Malicious Tools

    PRIVACY PRIVACY These include infostealers, multi-layer encryption tools and dark web marketplace scripts Read More

    Read More

  • Dark Web Actors Fight For Drug Trafficking and Illegal Pharmacy Supremacy

    PRIVACY PRIVACY Following the takedown of the Hydra Marketplace in 2022, 10 darknet markets rose to fill the void Read More

    Read More

  • Does a hybrid model for vulnerability management make sense?

    PRIVACY PRIVACY Graham Cluley Security News is sponsored this week by the folks at Edgescan. Thanks to the great team there for their support! Edgescan simplifies Vulnerability Management (VM) by delivering a single full-stack SaaS solution integrated with world-class security professionals. Edgescan helps enterprise companies consolidate managing multiple point scanning tools for each layer of…

    Read More

  • The Case for Your Security at CES 2023

    PRIVACY PRIVACY As technology weaves itself into our lives in new and unexpected ways, some of it will get quite personal and close to home. That made itself clear at CES this year, which makes a strong case for your security.  The more things we connect, the more data we create. Data about ourselves that…

    Read More

  • Identity Thieves Bypassed Experian Security to View Credit Reports

    PRIVACY PRIVACY Identity thieves have been exploiting a glaring security weakness in the website of Experian, one of the big three consumer credit reporting bureaus. Normally, Experian requires that those seeking a copy of their credit report successfully answer several multiple choice questions about their financial history. But until the end of 2022, Experian’s website…

    Read More

  • Identifying People Using Cell Phone Location Data

    PRIVACY PRIVACY The two people who shut down four Washington power stations in December were arrested. This is the interesting part: Investigators identified Greenwood and Crahan almost immediately after the attacks took place by using cell phone data that allegedly showed both men in the vicinity of all four substations, according to court documents. Nowadays,…

    Read More

  • Your Guide to Ransomware—and Preventing It Too

    PRIVACY PRIVACY Ransomware. Even the name sounds scary.  When you get down to it, ransomware is one of the nastiest attacks a hacker can wage. They target some of our most important and precious things—our files, our photos, and the information stored on our devices. Think about suddenly losing access to all of them and…

    Read More

  • Understanding Malware-as-a-Service (MaaS): The future Of cyber attack accessibility

    PRIVACY PRIVACY The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  With the explosive growth of technology, businesses are more vulnerable than ever to malicious cyber attacks. And as cybercriminals become more…

    Read More

  • Global Cyber-Attack Volume Surges 38% in 2022

    PRIVACY PRIVACY Last year was also worst on record for UK businesses Read More

    Read More

News, Advisories and much more

Exit mobile version