News

  • $43 billion stolen through Business Email Compromise since 2016, reports FBI

    PRIVACY PRIVACY The FBI’s Internet Crime Complaint Center (IC3) has issued updated statistics on Business Email Compromise (BEC) attacks which use a variety of social engineering and phishing techniques to break into accounts and trick companies into transferring large amounts of money into the hands of criminals. Read more in my article on the Tripwire…

    Read More

  • Latest Cohort Announced for NCSC For Startups

    PRIVACY PRIVACY The new cohort was chosen for their innovative approaches to tackling the growing ransomware threat Read More

    Read More

  • Chinese APT group Mustang Panda targets European and Russian organizations

    PRIVACY PRIVACY A cyberespionage group whose targeting has historically been aligned with China’s geopolitical interests has been targeting European and Russian entities using topical spear-phishing lures connected to the war in Ukraine. The group, tracked as Mustang Panda, RedDelta, Bronze President or TA416 by different cybersecurity firms, has been active since at least 2012 and…

    Read More

  • 15.3 Million Request-Per-Second DDoS Attack

    PRIVACY PRIVACY Cloudflare is reporting a large DDoS attack against an unnamed company “operating a crypto launchpad.” While this isn’t the largest application-layer attack we’ve seen, it is the largest we’ve seen over HTTPS. HTTPS DDoS attacks are more expensive in terms of required computational resources because of the higher cost of establishing a secure…

    Read More

  • See me speak at Cyber Security Nordic – either in Helsinki or online

    PRIVACY PRIVACY In my keynote I’ll be discussing whether cybercriminals really are evil geniuses (as the media and some security vendors would like us to believe), or not… Save 50% off the ticket price using a discount code. Read More

    Read More

  • South Korea Admitted to NATO Cyber Defense Center

    PRIVACY PRIVACY Country becomes first Asian nation to join the group Read More

    Read More

  • 9 top identity and access management tools

    PRIVACY PRIVACY Identity and access management (IAM) has long been a key proving ground of security leaders’ careers, with many a make-or-break decision made over identity technology deployments. Assuring secure access and managing identities is at the very foundation of cybersecurity postures. At the same time, the ways people, applications and systems log in and…

    Read More

  • NHS Inboxes Hijacked to Send 1000+ Malicious Emails

    PRIVACY PRIVACY Phishing campaign relied on individually compromised users Read More

    Read More

  • FBI: Thailand and Hong Kong Banks Used Most in BEC

    PRIVACY PRIVACY Email compromise could be a $43bn problem Read More

    Read More

  • Smashing Security podcast #273: Password blips, and who’s calling the airport?

    PRIVACY PRIVACY We find out why calls to Dublin airport’s noise complaints line have soared, and Carole quizzes Graham to celebrate World Password Day. All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast, with computer security veterans Graham Cluley and Carole Theriault. And don’t miss our special featured…

    Read More

News, Advisories and much more

Exit mobile version