News

  • Game-Related Cyber-Threats: Almost 100k Malicious Files Last Year

    PRIVACY PRIVACY Kaspersky also observed an increase in the number of programs that can steal secrets Read More

    Read More

  • Keybank’s Customer Information Stolen By Hackers Via Third-party Provider

    PRIVACY PRIVACY Overby-Seawell, a firm providing multiple clients with insurance services is alleged to have been the source of the breach Read More

    Read More

  • SharkBot Malware Resurfaces on Google Play to Steal Users’ Credentials

    PRIVACY PRIVACY It reportedly targets the banking credentials of Android users via apps with 60,000 installations Read More

    Read More

  • EvilProxy Phishing Toolkit Spotted on Dark Web Forums

    PRIVACY PRIVACY The tool highlights the growth in attacks against online services and MFA authorization mechanisms Read More

    Read More

  • What Is Synthetic Identity Theft?

    PRIVACY PRIVACY It’s too bad cybercriminals don’t funnel their creativity into productive pursuits because they’re constantly coming up with nefarious new ways to eke out money and information from unsuspecting people. One of their newest schemes is called synthetic identity theft, a type of identity theft that can happen to anyone. Luckily, there are ways…

    Read More

  • Samsung reports second data breach in 6 months

    PRIVACY PRIVACY Samsung has opened up about a data breach it detected on or around August 4, affecting the personal information of some of its customers. “In late July 2022, an unauthorized third party acquired information from some of Samsung’s US systems. On or around August 4, 2022, we determined through our ongoing investigation that…

    Read More

  • New Rules for Crypto Exchanges to Stop Sanctions Evaders

    PRIVACY PRIVACY UK Treasury demands exchanges report suspected breaches Read More

    Read More

  • Samsung Reveals New US Data Breach

    PRIVACY PRIVACY Personal info of “certain customers” was affected Read More

    Read More

  • Top 12 managed detection and response solutions

    PRIVACY PRIVACY Of all foundational elements for information security, logging requires far more care and feeding than its fellow cornerstones such as encryption, authentication or permissions. Log data must be captured, correlated and analyzed to be of any use. Due to typical log volume, software tools to manage log events is a must-have for businesses…

    Read More

  • How Azure Active Directory opens new authentication risks

    PRIVACY PRIVACY It’s been common knowledge for years that local Windows Active Directory networks are vulnerable to NTLM relay and pass-the-hash attacks that can allow attackers to move laterally through networks and access additional machines and resources. Since some of these attacks exploit design decisions in the authentication protocols used inside Windows networks, they cannot…

    Read More

News, Advisories and much more

Exit mobile version