News

  • VMware’s Karen Worstell: This isn’t a black swan world anymore

    Karen F. Worstell offers a grim assessment: Security teams, and by extension the organizations they serve, are now “living in a zero-day world.” “That’s our new reality, and we have to operate on the assumption of breach,” she says. [ Learn 7 tips for better CISO-CFO relationships and 5 key qualities of successful CISOs. | Sign…

    Read More

  • Mitek Acquires HooYu for $129m

    Pioneering British KYC tech company acquired by American ID verification firm Read More

    Read More

  • Smart Tips for Staying Safer Online

    The recent WannaCry ransomware attack that infected more than 250,000 computers worldwide was a good reminder to everyone about staying vigilant when it comes to internet safety. After all, many of us stay connected most of the time, whether it’s on our laptops or mobile devices, giving cybercriminals a wide range of opportunities to go…

    Read More

  • What is Spyware?

    No one likes the feeling that someone is looking over their shoulder when they work, shop or surf online. But this is just what crooks and scammers do without our knowledge using “spyware.” Spyware is a piece of software that can covertly gather information on you. It can track the websites you visit and even…

    Read More

  • Microsoft help files repurposed to contain Vidar malware in new campaign

    A new email campaign designed to spread the Vidar spyware package uses a novel technique involving Microsoft Compiled HTML help files, according to a blog post released today by Trustwave. The help files, which use the suffix “CHM,” are packaged in an ISO along with the Vidar payload in what appears to be a Word…

    Read More

  • Indian Police Bust Online Helicopter Scam

    Arrests made over fake websites selling forged helicopter ride tickets to pilgrims Read More

    Read More

  • US Indicts Russian Over “Carding Shop”

    Russian allegedly operated darknet store, selling stolen PII, credentials and authentication tools Read More

    Read More

  • ContiLeaks: Chats Reveal Over 30 Vulnerabilities Used by Conti Ransomware – How Tenable Can Help

    Private messages between Conti members uncover invaluable information about how the infamous ransomware group hijacks victims’ systems. Leaked internal chats between Conti ransomware group members offer a unique glimpse into its inner workings and provide valuable insights, including details on over 30 vulnerabilities used by the group and its affiliates, as well as specifics about…

    Read More

  • Linux Improves Its Random Number Generator

    In kernel version 5.17, both /dev/random and /dev/urandom have been replaced with a new — identical — algorithm based on the BLAKE2 hash function, which is an excellent security improvement. Read More

    Read More

  • Why I’m Proud to Protect

    At McAfee, we’re proud to protect. It’s part of our DNA. We’re all dedicated to keeping the world safe from cyber threats. As a team, we’re driven by our mission to protect all that matters. Individually, we’re motivated by our own unique reasons – whether that’s family, friends, or our communities. As part of our…

    Read More