-
Game-Related Cyber-Threats: Almost 100k Malicious Files Last Year
PRIVACY PRIVACY Kaspersky also observed an increase in the number of programs that can steal secrets Read More
-
Keybank’s Customer Information Stolen By Hackers Via Third-party Provider
PRIVACY PRIVACY Overby-Seawell, a firm providing multiple clients with insurance services is alleged to have been the source of the breach Read More
-
SharkBot Malware Resurfaces on Google Play to Steal Users’ Credentials
PRIVACY PRIVACY It reportedly targets the banking credentials of Android users via apps with 60,000 installations Read More
-
EvilProxy Phishing Toolkit Spotted on Dark Web Forums
PRIVACY PRIVACY The tool highlights the growth in attacks against online services and MFA authorization mechanisms Read More
-
What Is Synthetic Identity Theft?
PRIVACY PRIVACY It’s too bad cybercriminals don’t funnel their creativity into productive pursuits because they’re constantly coming up with nefarious new ways to eke out money and information from unsuspecting people. One of their newest schemes is called synthetic identity theft, a type of identity theft that can happen to anyone. Luckily, there are ways…
-
Samsung reports second data breach in 6 months
PRIVACY PRIVACY Samsung has opened up about a data breach it detected on or around August 4, affecting the personal information of some of its customers. “In late July 2022, an unauthorized third party acquired information from some of Samsung’s US systems. On or around August 4, 2022, we determined through our ongoing investigation that…
-
New Rules for Crypto Exchanges to Stop Sanctions Evaders
PRIVACY PRIVACY UK Treasury demands exchanges report suspected breaches Read More
-
Samsung Reveals New US Data Breach
PRIVACY PRIVACY Personal info of “certain customers” was affected Read More
-
Top 12 managed detection and response solutions
PRIVACY PRIVACY Of all foundational elements for information security, logging requires far more care and feeding than its fellow cornerstones such as encryption, authentication or permissions. Log data must be captured, correlated and analyzed to be of any use. Due to typical log volume, software tools to manage log events is a must-have for businesses…
-
How Azure Active Directory opens new authentication risks
PRIVACY PRIVACY It’s been common knowledge for years that local Windows Active Directory networks are vulnerable to NTLM relay and pass-the-hash attacks that can allow attackers to move laterally through networks and access additional machines and resources. Since some of these attacks exploit design decisions in the authentication protocols used inside Windows networks, they cannot…