-
Iran’s Digital Surveillance Tools Leaked
PRIVACY PRIVACY It’s Iran’s turn to have its digital surveillance tools leaked: According to these internal documents, SIAM is a computer system that works behind the scenes of Iranian cellular networks, providing its operators a broad menu of remote commands to alter, disrupt, and monitor how customers use their phones. The tools can slow their…
-
NCSC Issued 34 Million Cyber Alerts in Past Year
PRIVACY PRIVACY UK security agency helps organizations with early warning service Read More
-
Choosing a DAST solution: What to pay attention to?
PRIVACY PRIVACY The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The majority of today’s web applications contain dangerous vulnerabilities. To analyze their security, one cannot do without a dynamic scanner. DAST…
-
FTC Takes Enforcement Action Against EdTech Giant Chegg
PRIVACY PRIVACY Regulator’s order requires firm to improve data security practices Read More
-
The Worst Black Friday and Cyber Monday Scams – And How to Avoid Them
PRIVACY PRIVACY On Black Friday and Cyber Monday, the deals roll out. So do some of the worst Black Friday and Cyber Monday scams. Hackers, scammers, and thieves look to cash in this time of year by blending in with the holiday rush, spinning up their own fake shipping notices, phony deals, and even bogus…
-
Fraudulent Instruction Losses Spike in 2022
PRIVACY PRIVACY Insurer says claimants have risen in nearly every sector Read More
-
The OSPO – the front line for secure open-source software supply chain governance
PRIVACY PRIVACY Organizations of every shape, size, and sector have embraced open-source software (OSS). The financial, medical, and manufacturing industries – and even national security – now use OSS to power their most critical applications and activities. However, this widespread adoption comes with pitfalls: a corresponding increase of almost 800% in software supply chain attacks…
-
Accused ‘Raccoon’ Malware Developer Fled Ukraine After Russian Invasion
PRIVACY PRIVACY A 26-year-old Ukrainian man is awaiting extradition from The Netherlands to the United States on charges that he acted as a core developer for Raccoon, a popular “malware-as-a-service” offering that helped paying customers steal passwords and financial data from millions of cybercrime victims. KrebsOnSecurity has learned that the defendant was busted in March…
-
Extortion fears after hacker stole patient files from Dutch mental health clinics
PRIVACY PRIVACY Patients of Dutch mental health clinics are being warned that their personal records have fallen into the hands of hackers following a security breach at an online portal that “guaranteed” their privacy. Read more in my article on the Hot for Security blog. Read More
-
Engineering workstation attacks on industrial control systems double: Report
PRIVACY PRIVACY Engineering workstation compromises were the initial attack vector in 35% of all operational technology (OT) and industrial control system breaches in companies surveyed globally this year, doubling from the year earlier, according to research conducted by the SANS Institute and sponsored by Nozomi Networks. While the number of respondents who said they had…