News

  • #DTX2022: How to Scam Someone Using Social Media Phishing

    Jake Moore, global cybersecurity advisor at ESET, shared at DTX Europe 2022 how he used a fake social media profile to hack employees of a company Read More

    Read More

  • Magniber Ransomware Adopts JavaScript to Attack Individual Users

    Consumers should protect themselves by using least-privilege principles Read More

    Read More

  • Report Shows How China Has Been Using Cyberattacks Over the Past Decade

    Consultancy firm Booz Allen has published a comprehensive report on Chinese-sponsored threat Read More

    Read More

  • Security startups to watch for 2022

    The problems cybersecurity startups attempt to solve are often a bit ahead of the mainstream. They can move faster than most established companies to fill gaps or emerging needs. Startups can often innovative faster because they are unfettered by an installed base. The downside, of course, is that startups often lack resources and maturity. It’s…

    Read More

  • New Chinese attack framework Alchimist serves Windows, Linux, and macOS implants

    Researchers have discovered a new attack framework of Chinese origin that they believe is being used in the wild. The framework is made up of a command-and-control (C2) backend dubbed Alchimist and an accompanying customizable remote access Trojan (RAT) for Windows and Linux machines. The framework can also be used to generate PowerShell-based attack shellcode…

    Read More

  • Chinese APT WIP19 Targets IT Service Providers and Telcos

    The group is characterized by the use of a stolen digital certificate issued by DEEPSoft Read More

    Read More

  • Malicious WhatsApp Mod Spotted Infecting Android Devices

    YoWhatsApp v2.22.11.75 was distributed via ads on Android apps like Snaptube and VidMate Read More

    Read More

  • Budworm Espionage Group Returns, Targets US State Legislature

    Budworm leveraged the Log4j vulnerabilities to compromise the Apache Tomcat service on servers Read More

    Read More

  • Digital Estate Planning – What to Do With Your Digital Assets

    While we’re enjoying the fruits of digital life—our eBooks, movies, email accounts, social media profiles, eBay stores, photos, online games, and more—there will come a time we should ask ourselves, What happens to all of this good stuff when I die? Like anything else we own, those things can be passed along through our estates…

    Read More

  • Heat left by users’ fingertips could help hackers crack passwords, researchers claim

    Boffins at the University of Glasgow, in Scotland, have developed a system which they claim demonstrates a new type of cybersecurity threat: a “thermal attack.” According to the researchers, the falling price of heat-detecting thermal imaging cameras and advances in machine learning have made it more feasible to guess what passwords a target may have…

    Read More

News, Advisories and much more

Exit mobile version