News

  • QNAP Customers Hit by Double Ransomware Blitz

    PRIVACY PRIVACY Taiwanese manufacturer braced for twin threat Read More

    Read More

  • API attack types and mitigations

    PRIVACY PRIVACY This blog was written by an independent guest blogger. Stop, look, listen; lock, stock, and barrel; “Friends, Romans, Countrymen…” The 3 Little Pigs; Art has 3 primary colors; photography has the rule of thirds; the bands Rush and The Police; the movie The 3 Amigos. On and on it goes – “Omne trium…

    Read More

  • Investigators Disrupt Giant RSocks Botnet

    PRIVACY PRIVACY Russian cyber-criminals rented it out to other groups Read More

    Read More

  • 6 tips for effective security job postings (and 6 missteps to avoid)

    PRIVACY PRIVACY MongoDB CISO Lena Smart wants to make a good impression on prospective employees. So she’s attentive to what goes into the ads she posts when seeking to hire. “I think people forget that these are the first introductions that many candidates have to their companies, and first impressions matter,” she says. That may…

    Read More

  • Cryptojacking explained: How to prevent, detect, and recover from it

    PRIVACY PRIVACY Cryptojacking definition Cryptojacking is the unauthorized use of someone else’s compute resources to mine cryptocurrency. Hackers seek to hijack any kind of systems they can take over—desktops, servers, cloud infrastructure and more—to illicitly mine for crypto coins. Regardless of the delivery mechanism, cryptojacking code typically works quietly in the background as unsuspecting victims…

    Read More

  • Friday Squid Blogging: Signature Steamed Giant Squid with Thai Lime Sauce

    PRIVACY PRIVACY From a restaurant in Singapore. It’s not actually giant squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Read More

    Read More

  • What Is Identity Theft and How Do You Recover From It?

    PRIVACY PRIVACY The internet is a big place. While it’s changed the world for the better — making our daily lives that much easier! — it can also be a playground for cybercriminals who would love to get their hands on our personal information.   When this happens, it can result in identity theft. While it…

    Read More

  • Fake Facebook Email Uses Copyrights to Trick EI-ISAC Members

    PRIVACY PRIVACY Malicious actors recently targeted members of the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) with a copyright-themed fake Facebook email. Read More

    Read More

  • Microsoft Addresses Wi-Fi Hotspots Issues in Latest Update

    PRIVACY PRIVACY Host devices might lose connection to the internet after client device connects Read More

    Read More

  • US Man Sentenced to Nine Years in Prison for Hacking iCloud Accounts and Stealing Nudes

    PRIVACY PRIVACY Hao Kuo Chi illegally obtained iCloud credentials of 4700 victims Read More

    Read More

News, Advisories and much more

Exit mobile version