Industry News
-
ICO Warns of Fines for “Nefarious” AI UseUK privacy regulator, the information commissioner, says illegal use of AI will be punished with fines... Read More
-
Geopolitics to Blame For DoS Surge in Europe, Says ENISAEuropean security agency claims “novel and massive” DDoS threat is driven by political motivation... Read More
-
Ransomware Surge is Driving UK Inflation, Says VeeamVeeam research reveals that corporate victims of ransomware are more likely to increase prices and fire staff... Read More
-
New Report: Over 40% of Google Drive Files Contain Sensitive InfoThe Metomic research also suggested 34.2% of the files were shared with external contacts... Read More
-
UK Government Warns of Russian Cyber Campaigns Against DemocracyThe NCSC identified the threat group responsible as Star Blizzard, linked to Russia’s FSB Center 18... Read More
-
Cyber-Attacks More Likely Than Fire or Theft, Aviva Research FindsYouGov and Aviva research finds that UK businesses are almost five times as likely to have experienced a cyber-attack as a fire... Read More
-
Liability Fears Damaging CISO Role, Says Former Uber CISOFormer Uber CISO Joe Sullivan says CISOs are thinking about themselves rather than the bigger picture due to the risk of personal liability... Read More
-
Ninety Percent of Energy Companies Suffer Supplier Data BreachForty-three of the world’s 48 largest energy companies were hit by a third-party data breach over the past year... Read More
-
Governments Spying on Apple and Google Users, Says SenatorSecret government requests for Android and iOS push notification data should be made public, argues Ron Wyden... Read More
-
Cambridge Hospitals Admit Two Excel-Based Data BreachesInformation on cancer and maternity patients was accidentally disclosed by Cambridge University Hospitals NHS Foundation Trust... Read More
-
78% of CISOs Concerned About AppSec ManageabilityThe Cycode report draws from a survey of 500 US CISOs, AppSec Directors and DevSecOps team members... Read More
-
Trojan-Proxy Threat Expands Across macOS, Android and WindowsKaspersky found multiple variants, but none are being marked as malicious by anti-malware vendors... Read More
-
LockBit Remains Top Global Ransomware ThreatThe strain was responsible for over a quarter of global ransomware attacks between January 2022 and September 2023... Read More
-
Deutsche Wohnen Ruling Set to Drive Up GDPR FinesLegal experts claim that landmark ECJ ruling will make it easier for authorities to sanction organizations infringing the GDPR... Read More
-
Police Arrest 1000 Suspected Money MulesGlobal police arrest 1000 money mule suspects and identify thousands more in a major crackdown on money laundering... Read More
-
UK FCA Warns of Christmas Loan Fee Fraud SurgeFinancial Conduct Authority claims economic hardship is making consumers more vulnerable to loan fee fraud... Read More
-
Disney+ Cyber Scheme Exposes New Impersonation Attack TacticsAbnormal Security said the attackers used advanced customization techniques to deceive victims... Read More
-
SpyLoan Scams Target Android Users With Deceptive AppsESET said these apps request sensitive user information, exfiltrating it to attackers’ servers... Read More
-
US Federal Agencies Miss Deadline for Incident Response Requirements20 government agencies have failed to reach the incident response maturity level required by law, the GAO found in a new report... Read More
-
Russian APT28 Exploits Outlook Bug to Access ExchangeNotorious Russian APT28 group is actively exploiting CVE-2023-23397 to hijack Exchange email accounts... Read More
-
Porn Age Checks Threaten Security and Privacy, Report WarnsOnline Safety Act’s mandate for age verification to access pornography could be a security and privacy disaster, think tanks warn... Read More
-
Sellafield Accused of Covering Up Major Cyber BreachesEurope’s largest nuclear site, Sellafield, is accused of consistent security failings... Read More
-
Cybercriminals Escalate Microsoft Office Attacks By 53% in 2023The Kaspersky report also revealed an average detection of 411,000 malicious files per day... Read More
-
Rust-Based Botnet P2Pinfect Targets MIPS ArchitectureCado Security found the variant while investigating files uploaded to an SSH honeypot... Read More
-
What Is Credential Phishing?You guard the keys to your home closely, right? They have their own special spot in your bag or in... The post What Is Credential... Read More
-
Do I Really Need to be on Snapchat to be a Good Digital Parent?If you had to count the number of social media platforms your teen uses, I wonder what the score would... The post Do I Really... Read More
-
Is That Delivery Text Real or Fake? How to Shop and Ship Safely this SeasonWith the rush of Black Friday and Cyber Monday shopping comes a rush of another kind. Millions of fake delivery... The post Is That Delivery... Read More
-
PDF Phishing: Beyond the BaitBy Lakshya Mathur & Yashvi Shah Phishing attackers aim to deceive individuals into revealing sensitive information for financial gain, credential... The post PDF Phishing: Beyond... Read More
-
How To Help Your Teens Stay Safe When They Start Dating OnlineIn the 80’s, train stations and church groups were the key places to meet boys. And despite the fact I... The post How To Help... Read More
-
Look Out for the Cyber Grinch! How to Shop Safely This Holiday SeasonYes, there is a Cyber Grinch. In fact, you’ll find evidence of an entire host of grinches online — the... The post Look Out for... Read More
-
Beneath the Surface: How Hackers Turn NetSupport Against UsersNetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical analysis, we delve... The post Beneath the Surface:... Read More
-
Online Shopping: The Dos and Don’tsInternet shopping has become an integral part of our daily lives, providing convenience, variety, and easy price comparisons. However, with this convenience comes potential risks.... Read More
-
Sextortion – What Every Parent Needs To KnowImagine this. You’re 15, feeling unsure about yourself in the world, possibly even a little lonely. One day, a pretty... The post Sextortion – What... Read More
-
The Benefits of Protection – How Organizations Gain from Digital WellnessThis is the final in a series of three articles covering digital wellness programs in the workplace. Here we explore... The post The Benefits of... Read More
-
To fight cyber extortion and ransomware, shift leftHow can organizations defend themselves more effectively against ransomware and other forms of cyber extortion? By “shifting left” and adopting proactive cybersecurity strategies to detect... Read More
-
Inside the 2022 Email Cyber Threat LandscapeKey trends and predictions you should know about... Read More
-
Attack on Security Titans: Earth Longzhi Returns With New TricksAfter months of dormancy, Earth Longzhi, a subgroup of advanced persistent threat (APT) group APT41, has reemerged using new techniques in its infection routine. This... Read More
-
To Keep Up With Cybersecurity Laws, Go 'Federal First'With new cybersecurity laws and regulations rolling out, the best way to maintain broad compliance is to align with the most stringent frameworks. In the... Read More
-
Global Cyber Risk Lowers to Moderate Level in 2H' 2022Trend’s seventh edition of the Cyber Risk Index (CRI) reveals an in-depth analysis of cyber threat and vulnerabilities... Read More
-
Rapture, a Ransomware Family With Similarities to ParadiseIn March and April 2023, we observed a type of ransomware targeting its victims via a minimalistic approach with tools that leave only a minimal... Read More
-
SSL vs. TLS: Which should you be using?You may wonder if you should choose SSL or TLS to secure your network. Explore the differences between the two communications protocols, use cases where... Read More
-
Attackers Use Containers for Profit via TrafficStealerWe found TrafficStealer abusing open container APIs in order to redirect traffic to specific websites and manipulate engagement with ads.... Read More
-
Update Now: PaperCut Vulnerability CVE-2023-27350 Under Active ExploitationTwo vulnerabilities in PaperCut have been found, and one of them is being actively exploited in the wild. This blog entry provides a summary of... Read More
-
Achieving Cloud Compliance Throughout Your MigrationPart of a secure cloud migration strategy is ensuring compliance of all the moving pieces. Just like your cloud journey, cloud compliance isn’t all about... Read More