News

  • Amazon Fixes High Severity Vulnerability in Amazon Photos Android App

    PRIVACY PRIVACY The vulnerability derived from a misconfiguration of one of the Photos app’s components Read More

    Read More

  • Ecuador’s Attempt to Resettle Edward Snowden

    PRIVACY PRIVACY Someone hacked the Ecuadorian embassy in Moscow and found a document related to Ecuador’s 2013 efforts to bring Edward Snowden there. If you remember, Snowden was traveling from Hong Kong to somewhere when the US revoked his passport, stranding him in Russia. In the document, Ecuador asks Russia to provide Snowden with safe…

    Read More

  • A guide to teaching cybersecurity skills to special needs students

    PRIVACY PRIVACY This blog was written by an independent guest blogger. Schools and colleges were the worst hit by cyberattacks during the global health crisis in 2020. According to a report by GCN, ransomware attacks alone affected over 1,680 schools, colleges, and universities in the US. Such attacks also targeted 44% of educational institutions across the…

    Read More

  • Chinese Influence Op Tries to Undermine Western Rare Earth Firms

    PRIVACY PRIVACY Micro-targeting of local users a first for Beijing Read More

    Read More

  • FBI: Beware Deepfakes Used to Apply for Remote Jobs

    PRIVACY PRIVACY Feds warn of fraudulent attempts to land work Read More

    Read More

  • Why more zero-day vulnerabilities are being found in the wild

    PRIVACY PRIVACY The number of zero-days exploited in the wild has been high over the past year and a half, with different kinds of actors using them. These vulnerabilities, which are unknown to the software maker, are leveraged by both state-sponsored groups and ransomware gangs. During the first half of this year, Google Project Zero…

    Read More

  • How and why threat actors target Microsoft Active Directory

    PRIVACY PRIVACY Microsoft Active Directory debuted 22 years ago. In computer age, that’s old technology. Threat actors like old technology because it often has legacy code or processes that are not secured to modern standards or organizations have not kept up with patches and recommended settings. Derek Melber, chief technology and security strategist for Tenable,…

    Read More

  • Ransomware Suspected in Wiltshire Farm Foods Attack

    PRIVACY PRIVACY Food manufacturer reveals system outage Read More

    Read More

  • How to Build Cybersecurity Compliance with Free CIS Resources

    PRIVACY PRIVACY Cybersecurity compliance doesn’t have to be overwhelming. Organizations can use free CIS resources to build a plan that works for them. Read More

    Read More

  • The Link Between AWM Proxy & the Glupteba Botnet

    PRIVACY PRIVACY On December 7, 2021, Google announced it was suing two Russian men allegedly responsible for operating the Glupteba botnet, a global malware menace that has infected millions of computers over the past decade. That same day, AWM Proxy — a 14-year-old anonymity service that rents hacked PCs to cybercriminals — suddenly went offline.…

    Read More

News, Advisories and much more

Exit mobile version