-
#DTX2022: How to Scam Someone Using Social Media Phishing
Jake Moore, global cybersecurity advisor at ESET, shared at DTX Europe 2022 how he used a fake social media profile to hack employees of a company Read More
-
Magniber Ransomware Adopts JavaScript to Attack Individual Users
Consumers should protect themselves by using least-privilege principles Read More
-
Report Shows How China Has Been Using Cyberattacks Over the Past Decade
Consultancy firm Booz Allen has published a comprehensive report on Chinese-sponsored threat Read More
-
Security startups to watch for 2022
The problems cybersecurity startups attempt to solve are often a bit ahead of the mainstream. They can move faster than most established companies to fill gaps or emerging needs. Startups can often innovative faster because they are unfettered by an installed base. The downside, of course, is that startups often lack resources and maturity. It’s…
-
New Chinese attack framework Alchimist serves Windows, Linux, and macOS implants
Researchers have discovered a new attack framework of Chinese origin that they believe is being used in the wild. The framework is made up of a command-and-control (C2) backend dubbed Alchimist and an accompanying customizable remote access Trojan (RAT) for Windows and Linux machines. The framework can also be used to generate PowerShell-based attack shellcode…
-
Chinese APT WIP19 Targets IT Service Providers and Telcos
The group is characterized by the use of a stolen digital certificate issued by DEEPSoft Read More
-
Malicious WhatsApp Mod Spotted Infecting Android Devices
YoWhatsApp v2.22.11.75 was distributed via ads on Android apps like Snaptube and VidMate Read More
-
Budworm Espionage Group Returns, Targets US State Legislature
Budworm leveraged the Log4j vulnerabilities to compromise the Apache Tomcat service on servers Read More
-
Digital Estate Planning – What to Do With Your Digital Assets
While we’re enjoying the fruits of digital life—our eBooks, movies, email accounts, social media profiles, eBay stores, photos, online games, and more—there will come a time we should ask ourselves, What happens to all of this good stuff when I die? Like anything else we own, those things can be passed along through our estates…
-
Heat left by users’ fingertips could help hackers crack passwords, researchers claim
Boffins at the University of Glasgow, in Scotland, have developed a system which they claim demonstrates a new type of cybersecurity threat: a “thermal attack.” According to the researchers, the falling price of heat-detecting thermal imaging cameras and advances in machine learning have made it more feasible to guess what passwords a target may have…