-
QNAP Customers Hit by Double Ransomware Blitz
PRIVACY PRIVACY Taiwanese manufacturer braced for twin threat Read More
-
API attack types and mitigations
PRIVACY PRIVACY This blog was written by an independent guest blogger. Stop, look, listen; lock, stock, and barrel; “Friends, Romans, Countrymen…” The 3 Little Pigs; Art has 3 primary colors; photography has the rule of thirds; the bands Rush and The Police; the movie The 3 Amigos. On and on it goes – “Omne trium…
-
Investigators Disrupt Giant RSocks Botnet
PRIVACY PRIVACY Russian cyber-criminals rented it out to other groups Read More
-
6 tips for effective security job postings (and 6 missteps to avoid)
PRIVACY PRIVACY MongoDB CISO Lena Smart wants to make a good impression on prospective employees. So she’s attentive to what goes into the ads she posts when seeking to hire. “I think people forget that these are the first introductions that many candidates have to their companies, and first impressions matter,” she says. That may…
-
Cryptojacking explained: How to prevent, detect, and recover from it
PRIVACY PRIVACY Cryptojacking definition Cryptojacking is the unauthorized use of someone else’s compute resources to mine cryptocurrency. Hackers seek to hijack any kind of systems they can take over—desktops, servers, cloud infrastructure and more—to illicitly mine for crypto coins. Regardless of the delivery mechanism, cryptojacking code typically works quietly in the background as unsuspecting victims…
-
Friday Squid Blogging: Signature Steamed Giant Squid with Thai Lime Sauce
PRIVACY PRIVACY From a restaurant in Singapore. It’s not actually giant squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Read More
-
What Is Identity Theft and How Do You Recover From It?
PRIVACY PRIVACY The internet is a big place. While it’s changed the world for the better — making our daily lives that much easier! — it can also be a playground for cybercriminals who would love to get their hands on our personal information. When this happens, it can result in identity theft. While it…
-
Fake Facebook Email Uses Copyrights to Trick EI-ISAC Members
PRIVACY PRIVACY Malicious actors recently targeted members of the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) with a copyright-themed fake Facebook email. Read More
-
Microsoft Addresses Wi-Fi Hotspots Issues in Latest Update
PRIVACY PRIVACY Host devices might lose connection to the internet after client device connects Read More
-
US Man Sentenced to Nine Years in Prison for Hacking iCloud Accounts and Stealing Nudes
PRIVACY PRIVACY Hao Kuo Chi illegally obtained iCloud credentials of 4700 victims Read More