-
Anonymous Claims Attacks Against Belarus for Involvement in Russian Invasion of Ukraine
PRIVACY PRIVACY Several ministry websites shut down by Anonymous affiliates in retaliation for Belarus’ support of Russia’s Ukrainian invasion. Read More
-
US Academic Credentials Displayed in Public and Dark Web Forums
PRIVACY PRIVACY Credentials from several US-based universities and colleges have been spotted by the FBI in Russian cyber-criminal forums Read More
-
Follina. Unpatched Microsoft Office zero-day vulnerability exploited in the wild
PRIVACY PRIVACY The world is waiting for a patch from Microsoft, after a zero-day vulnerability in Microsoft Office was found to be being exploited in boobytrapped Word documents to remotely execute code on victims’ PCs. Read More
-
How Costa Rica found itself at war over ransomware
PRIVACY PRIVACY Costa Rica’s newly-elected president has declared a national state of emergency, as its ongoing crisis costs the nation an estimated USD $38 million a day. Perhaps in a different time, we would assumed the country had been struck by a devasting natural disaster or was struggling with some internal conflict—but times have changed.…
-
Biometric Mobile Payments Set to Exceed $1 Trillion by 2027
PRIVACY PRIVACY New EU regulations will help to drive increase Read More
-
Third of UK Firms Have Experienced a Security Breach Since 2020
PRIVACY PRIVACY Cyber drives surge in economic crime, says PwC Read More
-
Linux malware is on the rise—6 types of attacks to look for
PRIVACY PRIVACY Linux is a coveted target. It is the host operating system for numerous application backends and servers and powers a wide variety of internet of things (IoT) devices. Still, not enough is done to protect the machines running it. “Linux malware has been massively overlooked,” says Giovanni Vigna, senior director of threat intelligence…
-
The Open Source Software Security Mobilization Plan: Takeaways for security leaders
PRIVACY PRIVACY The Linux Foundation and the Open Source Security Foundation (OpenSSF) have introduced the Open Source Software Security Mobilization Plan. This is in response to attacks on the software supply chain and an uptick in interest in securing them. Supply chains are appealing targets to malicious actors because they can compromise a single point…
-
Mobile Threat Volumes Slump 58% in a Year
PRIVACY PRIVACY App stores a hotbed of malicious activity, Kaspersky warns Read More
-
Friday Squid Blogging: Squid Bites Diver
PRIVACY PRIVACY I agree; the diver deserved it. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Read More