News
-
VMware’s Karen Worstell: This isn’t a black swan world anymore
Karen F. Worstell offers a grim assessment: Security teams, and by extension the organizations they serve, are now “living in a zero-day world.” “That’s our new reality, and we have to operate on the assumption of breach,” she says. [ Learn 7 tips for better CISO-CFO relationships and 5 key qualities of successful CISOs. | Sign…
-
Mitek Acquires HooYu for $129m
Pioneering British KYC tech company acquired by American ID verification firm Read More
-
Smart Tips for Staying Safer Online
The recent WannaCry ransomware attack that infected more than 250,000 computers worldwide was a good reminder to everyone about staying vigilant when it comes to internet safety. After all, many of us stay connected most of the time, whether it’s on our laptops or mobile devices, giving cybercriminals a wide range of opportunities to go…
-
What is Spyware?
No one likes the feeling that someone is looking over their shoulder when they work, shop or surf online. But this is just what crooks and scammers do without our knowledge using “spyware.” Spyware is a piece of software that can covertly gather information on you. It can track the websites you visit and even…
-
Microsoft help files repurposed to contain Vidar malware in new campaign
A new email campaign designed to spread the Vidar spyware package uses a novel technique involving Microsoft Compiled HTML help files, according to a blog post released today by Trustwave. The help files, which use the suffix “CHM,” are packaged in an ISO along with the Vidar payload in what appears to be a Word…
-
Indian Police Bust Online Helicopter Scam
Arrests made over fake websites selling forged helicopter ride tickets to pilgrims Read More
-
US Indicts Russian Over “Carding Shop”
Russian allegedly operated darknet store, selling stolen PII, credentials and authentication tools Read More
-
ContiLeaks: Chats Reveal Over 30 Vulnerabilities Used by Conti Ransomware – How Tenable Can Help
Private messages between Conti members uncover invaluable information about how the infamous ransomware group hijacks victims’ systems. Leaked internal chats between Conti ransomware group members offer a unique glimpse into its inner workings and provide valuable insights, including details on over 30 vulnerabilities used by the group and its affiliates, as well as specifics about…
-
Linux Improves Its Random Number Generator
In kernel version 5.17, both /dev/random and /dev/urandom have been replaced with a new — identical — algorithm based on the BLAKE2 hash function, which is an excellent security improvement. Read More
-
Why I’m Proud to Protect
At McAfee, we’re proud to protect. It’s part of our DNA. We’re all dedicated to keeping the world safe from cyber threats. As a team, we’re driven by our mission to protect all that matters. Individually, we’re motivated by our own unique reasons – whether that’s family, friends, or our communities. As part of our…