-
EU Officials Targeted with Pegasus Spyware
PRIVACY PRIVACY Pegasus spyware was allegedly used to spy on the current European Justice Commissioner Read More
-
Double-Your-Crypto Scams Share Crypto Scam Host
PRIVACY PRIVACY Online scams that try to separate the unwary from their cryptocurrency are a dime a dozen, but a great many seemingly disparate crypto scam websites tend to rely on the same dodgy infrastructure providers to remain online in the face of massive fraud and abuse complaints from their erstwhile customers. Here’s a closer…
-
“Pen tester” who helped FIN7 gang cause $1 billion damage, sentenced to five years behind bars
PRIVACY PRIVACY A Ukrainian man has been sentenced to five years in prison by a US court for his involvement in the notorious criminal hacking group, FIN7. Read more in my article on the Hot for Security blog. Read More
-
With AI RMF, NIST addresses artificial intelligence risks
PRIVACY PRIVACY Business and government organizations are rapidly embracing an expanding variety of artificial intelligence (AI) applications: automating activities to function more efficiently, reshaping shopping recommendations, credit approval, image processing, predictive policing, and much more. Like any digital technology, AI can suffer from a range of traditional security weaknesses and other emerging concerns such as…
-
De-anonymizing Bitcoin
PRIVACY PRIVACY Andy Greenberg wrote a long article — an excerpt from his new book — on how law enforcement de-anonymized bitcoin transactions to take down a global child porn ring. Within a few years of Bitcoin’s arrival, academic security researchers — and then companies like Chainalysis — began to tear gaping holes in the…
-
FBI active defense measure removes malware from privately owned firewalls
PRIVACY PRIVACY For the second time in a year the FBI has used search-and-seizure warrants to clean malware from devices owned by private businesses and users without their explicit approval. The agency used this approach to disrupt a botnet believed to be the creation of Russian government hackers. The operation targeted the Cyclops Blink malware…
-
Why use a managed services provider for your SASE implementation
PRIVACY PRIVACY Recently the architecture model known as Secure Access Service Edge (SASE) has been gaining momentum. Not surprising, when the model provides benefits – including reduced complexity of management, improved network performance and resiliency, security policy implemented consistently across office and remote users and lower operational expense. In fact, according to a recent ESG…
-
Fraudsters Steal £58m in 2021 Via Remote Access Tools
PRIVACY PRIVACY Victims often receive an unsolicited call first Read More
-
Meta, Apple emergency data request scam holds lessons for CISOs
PRIVACY PRIVACY A recent Bloomberg piece highlighted how Meta Platforms, Inc., (parent company of Facebook) and Apple, Inc., had been successfully socially engineered into providing customer data in response to “emergency data requests” to individuals who they believed to be representing the U.S. government. If your entity is collecting customer data, it is possible you’ll…
-
10 NFT and cryptocurrency security risks that CISOs must navigate
PRIVACY PRIVACY The list of companies accepting payments in cryptocurrency keeps expanding, so customers can buy almost everything they want: electronics, college degrees and cappuccinos. At the same time, the market for non-fungible tokens (NFTs) skyrockets, with new artists becoming millionaires and more established names like Snoop Dogg, Martha Stewart and Grimes capitalizing on the…