News

  • Nigerian Prison Break

    PRIVACY PRIVACY There was a massive prison break in Abuja, Nigeria: Armed with bombs, Rocket Propelled Grenade (RPGs) and General Purpose Machine Guns (GPMG), the attackers, who arrived at about 10:05 p.m. local time, gained access through the back of the prison, using dynamites to destroy the heavily fortified facility, freeing 600 out of the…

    Read More

  • 5 Common blind spots that make you vulnerable to supply chain attacks

    PRIVACY PRIVACY This blog was written by an independent guest blogger. Over the past several years, hackers have gone from targeting only companies to also targeting their supply chain. One area of particular vulnerability is company software supply chains, which are becoming an increasingly common method of gaining access to valuable business information. A study…

    Read More

  • Ransomware Attack Hits French Telecoms Firm

    PRIVACY PRIVACY La Poste Mobile is urging customers to be vigilant following the incident Read More

    Read More

  • Understanding your API attack surface: How to get started

    PRIVACY PRIVACY We live in a world of cloud computing, mobile devices and microservices. Nearly every application we interact with is powered by APIs, often many, especially when dealing with the leading cloud service providers (CSPs), mobile applications and microservice environments. This makes APIs a critical part of an organization’s attack surface. Akamai estimates that…

    Read More

  • Experian, You Have Some Explaining to Do

    PRIVACY PRIVACY Twice in the past month KrebsOnSecurity has heard from readers who’ve had their accounts at big-three credit bureau Experian hacked and updated with a new email address that wasn’t theirs. In both cases the readers used password managers to select strong, unique passwords for their Experian accounts. Research suggests identity thieves were able…

    Read More

  • Microsoft rolls back plan to block macros by default

    PRIVACY PRIVACY Things haven’t gone as smoothly as Microsoft (and, indeed, the rest of us) might have hoped… Read More

    Read More

  • Recorded Future closes acquisition of malware analysis firm Hatching

    PRIVACY PRIVACY In a move to broaden its portfolio of cybersecurity products, Boston-based threat intelligence collection and analysis firm Recorded Future has reached an agreement to purchase Dutch malware analysis company Hatching Recorded Future offers a wide range of different types of intelligence on digital threats, using proprietary predictive analytics to track public documents, potentially…

    Read More

  • Emsisoft Releases Free Decryptor For AstraLocker and Yashma Ransomware

    PRIVACY PRIVACY The company also provided a download link and related instructions for the tool Read More

    Read More

  • Spear Phishing Fake Job Offer Likely Behind Axie Infinity’s Lazarus $600m Hack

    PRIVACY PRIVACY The message with the fake offer contained a PDF that would have delivered spyware Read More

    Read More

  • Disneyland’s Instagram and Facebook Accounts Hacked to Show Racist Content

    PRIVACY PRIVACY The threat actor claimed he was seeking “revenge” on Disneyland employees Read More

    Read More

News, Advisories and much more

Exit mobile version