News

  • Savvy cryptomining malware campaign targets Asian cloud service providers

    PRIVACY PRIVACY Asian cloud service providers have been targeted by a sophisticated malware campaign designed to steal computing power for mining cryptocurrency. The attack techniques deployed by the CoinStomp malware include timestomping (modification of a file’s timestamp), removal of system cryptographic policies, and use of a reverse shell to initiate command and control communications with…

    Read More

  • Information systems and cybersecurity: Connections in UX and beyond

    PRIVACY PRIVACY Image source: Pexels This blog was written by an independent guest blogger. Information systems and cybersecurity go hand in hand. Understanding the relationship between the two is paramount for enterprises to optimize the user experience (UX). How information systems transform enterprises Enterprises use information systems to organize, process, analyze, and disseminate data. In…

    Read More

  • UK Adds New Offenses to Online Safety Bill

    PRIVACY PRIVACY UK Adds New Offenses to Online Safety Bill The UK government has unveiled plans to strengthen its Online Safety Bill, which includes the creation of new criminal offenses. The legislation, first drafted in May 2021, will place new obligations on social media sites and other services hosting user-generated content or allowing people to talk to…

    Read More

  • European Police Flag 500+ Pieces of Terrorist Content

    PRIVACY PRIVACY European Police Flag 500+ Pieces of Terrorist Content European police have found and referred 563 pieces of terrorist content to service providers in the region, as a UK man was jailed for sharing a bomb-making manual online. The Referral Action Day took place last week at Europol’s headquarters. The EU’s Internet Referral Unit (EU…

    Read More

  • Swissport Ransomware Attack Delayed Flights

    PRIVACY PRIVACY Swissport Ransomware Attack Delayed Flights Airport services giant Swissport is restoring its IT systems after a ransomware attack struck late last week, delaying flights. The Zurich-headquartered firm operates everything from check-in gates and airport security to baggage handling, aircraft fuelling and de-icing and lounge hospitality. It claims to have provided ground services to 97 million…

    Read More

  • CISOs are burned out and falling behind

    PRIVACY PRIVACY The CISO’s text was brief but telling: “I never want an operational role again,” it read, arriving on Jeff Pollard’s phone in December as security teams scrambled to deal with the latest headline-making threat, Log4j. “He’s an effective CISO with a long tenure, but his mentality was ‘Here we go again.’ He was…

    Read More

  • Social engineering: Definition, examples, and techniques

    PRIVACY PRIVACY What is social engineering? Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data. For example, instead of trying to find a software vulnerability, a social engineer might call an employee and pose as an IT support person, trying to trick…

    Read More

  • Crypto Firm Meter Loses $4.4m in Cyber-Heist

    PRIVACY PRIVACY Crypto Firm Meter Loses $4.4m in Cyber-Heist Yet another cryptocurrency firm has been hacked to the tune of millions of dollars. Meter provides decentralized finance (DeFi) infrastructure services, linking siloed blockchains for users with so-called “cross-chain bridges.” Over the weekend, it revealed that an unauthorized intruder had managed to exploit a bridge vulnerability…

    Read More

  • How iOS Malware May Snoop on Our Devices

    PRIVACY PRIVACY Smartphones have become such an integral part of our lives that it’s hard to imagine a time when we didn’t have them. We carry so much of our lives on our devices, from our social media accounts and photos of our pets to our banking information and home addresses. Whether it be just…

    Read More

  • Emotet’s Uncommon Approach of Masking IP Addresses

    PRIVACY PRIVACY Authored By: Kiran Raj In a recent campaign of Emotet, McAfee Researchers observed a change in techniques. The Emotet maldoc was using hexadecimal and octal formats to represent IP address which is usually represented by decimal formats. An example of this is shown below: Hexadecimal format: 0xb907d607 Octal format: 0056.0151.0121.0114 Decimal format: 185.7.214.7…

    Read More

News, Advisories and much more

Exit mobile version