-
Baker & Taylor’s Systems Remain Offline a Week After Ransomware Attack
PRIVACY PRIVACY The company said it will proceed to restore its systems as soon as they are sanitized Read More
-
How 1-Time Passcodes Became a Corporate Liability
PRIVACY PRIVACY Phishers are enjoying remarkable success using text messages to steal remote access credentials and one-time passcodes from employees at some of the world’s largest technology companies and customer support firms. A recent spate of SMS phishing attacks from one cybercriminal group has spawned a flurry of breach disclosures from affected companies, which are…
-
Cryptominer Disguised as Google Translate Targeted 11 Countries
PRIVACY PRIVACY Created by a Turkish-speaking entity, the malware claimed around 111,000 victims in 11 countries Read More
-
Boots lets down its customers, by only offering SMS-based 2FA
PRIVACY PRIVACY I must admit I was delighted to receive an email today from UK high street pharmacy Boots telling me I should enable two-factor authentication on my account. Boots customers would have benefited from two-factor authentication a couple of years ago, when hackers attempted to gain access to customers’ Boots Advantage Card accounts, and…
-
FTC Sues Data Broker
PRIVACY PRIVACY This is good news: The Federal Trade Commission (FTC) has sued Kochava, a large location data provider, for allegedly selling data that the FTC says can track people at reproductive health clinics and places of worship, according to an announcement from the agency. “Defendant’s violations are in connection with acquiring consumers’ precise geolocation…
-
Google Launches Major Open Source Bug Bounty Program
PRIVACY PRIVACY Initiative is part of $10bn commitment to improve cybersecurity Read More
-
New Go-based Ransomware ‘Agenda’ Delivers Customized Attacks
PRIVACY PRIVACY Agenda can reboot systems in safe mode and stop many server-specific processes and services Read More
-
Multi-stage crypto-mining malware hides in legitimate apps with month-long delay trigger
PRIVACY PRIVACY Researchers have discovered a new multi-stage malware delivery campaign that relies on legitimate application installers distributed through popular software download sites. The malicious payload delivery, which includes a cryptocurrency mining program, is done in stages with long delays that can add up to almost a month. “After the initial software installation, the attackers…
-
XDR: Why open is better than closed
PRIVACY PRIVACY In a new 12-minute video Rakesh Shah AVP Product Management and Development of AT&T Cybersecurity, explains Extended Detection and Response (XDR). This video was part of the virtual Black Hat USA event in August. It’s not product-specific and explains what can be a very confusing concept in a delightfully simple way. XDR and why…
-
FBI: Hackers Are Exploiting DeFi Bugs to Steal Funds
PRIVACY PRIVACY Users of decentralized finance platforms at risk Read More