News

  • EU Officials Targeted with Pegasus Spyware

    PRIVACY PRIVACY Pegasus spyware was allegedly used to spy on the current European Justice Commissioner Read More

    Read More

  • Double-Your-Crypto Scams Share Crypto Scam Host

    PRIVACY PRIVACY Online scams that try to separate the unwary from their cryptocurrency are a dime a dozen, but a great many seemingly disparate crypto scam websites tend to rely on the same dodgy infrastructure providers to remain online in the face of massive fraud and abuse complaints from their erstwhile customers. Here’s a closer…

    Read More

  • “Pen tester” who helped FIN7 gang cause $1 billion damage, sentenced to five years behind bars

    PRIVACY PRIVACY A Ukrainian man has been sentenced to five years in prison by a US court for his involvement in the notorious criminal hacking group, FIN7. Read more in my article on the Hot for Security blog. Read More

    Read More

  • With AI RMF, NIST addresses artificial intelligence risks

    PRIVACY PRIVACY Business and government organizations are rapidly embracing an expanding variety of artificial intelligence (AI) applications: automating activities to function more efficiently, reshaping shopping recommendations, credit approval, image processing, predictive policing, and much more. Like any digital technology, AI can suffer from a range of traditional security weaknesses and other emerging concerns such as…

    Read More

  • De-anonymizing Bitcoin

    PRIVACY PRIVACY Andy Greenberg wrote a long article — an excerpt from his new book — on how law enforcement de-anonymized bitcoin transactions to take down a global child porn ring. Within a few years of Bitcoin’s arrival, academic security researchers — and then companies like Chainalysis — began to tear gaping holes in the…

    Read More

  • FBI active defense measure removes malware from privately owned firewalls

    PRIVACY PRIVACY For the second time in a year the FBI has used search-and-seizure warrants to clean malware from devices owned by private businesses and users without their explicit approval. The agency used this approach to disrupt a botnet believed to be the creation of Russian government hackers. The operation targeted the Cyclops Blink malware…

    Read More

  • Why use a managed services provider for your SASE implementation

    PRIVACY PRIVACY Recently the architecture model known as Secure Access Service Edge (SASE) has been gaining momentum. Not surprising, when the model provides benefits – including reduced complexity of management, improved network performance and resiliency, security policy implemented consistently across office and remote users and lower operational expense. In fact, according to a recent ESG…

    Read More

  • Fraudsters Steal £58m in 2021 Via Remote Access Tools

    PRIVACY PRIVACY Victims often receive an unsolicited call first Read More

    Read More

  • Meta, Apple emergency data request scam holds lessons for CISOs

    PRIVACY PRIVACY A recent Bloomberg piece highlighted how Meta Platforms, Inc., (parent company of Facebook) and Apple, Inc., had been successfully socially engineered into providing customer data in response to “emergency data requests” to individuals who they believed to be representing the U.S. government. If your entity is collecting customer data, it is possible you’ll…

    Read More

  • 10 NFT and cryptocurrency security risks that CISOs must navigate

    PRIVACY PRIVACY The list of companies accepting payments in cryptocurrency keeps expanding, so customers can buy almost everything they want: electronics, college degrees and cappuccinos. At the same time, the market for non-fungible tokens (NFTs) skyrockets, with new artists becoming millionaires and more established names like Snoop Dogg, Martha Stewart and Grimes capitalizing on the…

    Read More

News, Advisories and much more

Exit mobile version