-
BEC Attacks Expand Beyond Email and Toward Mobile Devices
PRIVACY PRIVACY Scammers typically obtain mobile numbers from data breaches, social media and data brokers Read More
-
Rackspace customers rage following ransomware attack, as class-action lawsuits filed
PRIVACY PRIVACY As ever, what matters most is not so much whether an organisation gets hit or not by a ransomware attack, but how well it handles the aftermath and recovery. Read more in my article on the Hot for Security blog. Read More
-
Cobalt Mirage Affiliate Uses GitHub to Relay Drokbk Malware Instructions
PRIVACY PRIVACY Secureworks said the malicious code is written in .NET and comprises a dropper and a payload Read More
-
Software Supply Chain Attacks Leveraging Open-Sources Repos Growing
PRIVACY PRIVACY ReversingLabs found an increasing number of malicious packages in three popular repositories Read More
-
Uptycs launches agentless cloud workload scanning
PRIVACY PRIVACY CNAPP (cloud native application protection platform) and XDR (extended detection and response ) provider Uptycs announced Friday that it has added agentless scanning to its existing cloud workload protection platform, which it said will open up a range of new use cases and attract new potential customers. The company said that its agentless…
-
Security Vulnerabilities in Eufy Cameras
PRIVACY PRIVACY Eufy cameras claim to be local only, but upload data to the cloud. The company is basically lying to reporters, despite being shown evidence to the contrary. The company’s behavior is so egregious that ReviewGeek is no longer recommending them. This will be interesting to watch. If Eufy can ignore security researchers and…
-
#BHEU: UK Government Calls for Industry Input on its Cybersecurity Strategy
PRIVACY PRIVACY A DCMS official sets out the UK government’s cybersecurity strategy during Black Hat Europe 2022 Read More
-
2022’s Top 5 App Security Tips
PRIVACY PRIVACY Happy National App Day! No, we don’t mean apps of the mozzarella stick and potato skin variety, but your mobile apps that let you order dinner, hail a taxi, stay connected to your friends, and entertain you for hours with silly videos. While they’re undoubtedly useful, mobile apps are also a weak spot…
-
Government to Fund Security Studies for Hundreds of Students
PRIVACY PRIVACY Latest move shows urgent need to nurture skills pipeline Read More
-
Security Concerns Scupper Deals for Two-Thirds of Firms
PRIVACY PRIVACY Global report ties poor security to bottom-line impact Read More