Industry News
-
Ring to Pay Out $5.6m in Refunds After Customer Privacy BreachThe US Federal Trade Commission will send $5.6m worth of refunds to the spied-on customers of the Amazon-owned home camera company... Read More
-
US Takes Down Illegal Cryptocurrency Mixing Service Samourai WalletThe two founders of Samourai Wallet have been charged with money laundering and unlicensed money-transmitting offenses... Read More
-
State-Sponsored Espionage Campaign Exploits Cisco VulnerabilitiesAn advisory from Cisco Talos has highlighted a sophisticated cyber-espionage campaign targeting government networks globally... Read More
-
DragonForce Ransomware Group Uses LockBit's Leaked BuilderCyber threat intelligence provider Cyble found that DragonForce was using a ransomware binary based on LockBit Black’s builder... Read More
-
11% of Cybersecurity Teams Have Zero WomenA new ISC2 study highlights the lack of diversity in cybersecurity with only 4% of teams having a majority of women, while 11% have none... Read More
-
Online Banking Security Still Not Up to Par, Says Which?Consumer rights group Which? has found more security gaps in UK banking sites and apps... Read More
-
BEC and Fund Transfer Fraud Top Insurance ClaimsEmail-borne fraud accounted for more insurance claims than any other category in 2023, says Coalition... Read More
-
High Performance Podcast Duo to Unveil Secrets of Success at Infosecurity Europe 2024Jake Humphrey and Professor Damian Hughes, the minds behind the High Performance Podcast, share their top non-negotiable behaviours for success in cybersecurity... Read More
-
US Congress Passes Bill to Ban TikTokThe bill that could see TikTok banned in the US has been approved by the House of Representatives and the Senate... Read More
-
US Sanctions Iranian "Fronts" for Cyber-Attacks on American EntitiesThe US Treasury announced sanctions on two companies and four individuals for cyber campaigns conducted on behalf of the Iranian government... Read More
-
Leeds Talent Pool Attracts BlueVoyant's First UK Security Operations CenterThe proximity of organizations’ headquarters, like Asda’s and NHS England’s, prompted BlueVoyant to choose Leeds as the location for its first UK SOC... Read More
-
Security Leaders Braced for Daily AI-Driven Attacks by Year-EndNetacea research found that 93% of security leaders expect to face daily AI-driven attacks by the end of 2024, with 65% predicting that offensive AI... Read More
-
Fifth of CISOs Admit Staff Leaked Data Via GenAIOne in five UK organizations have had corporate data exposed via generative AI, says RiverSafe... Read More
-
North Korean Hackers Target Dozens of Defense CompaniesNorth Korean hackers ran a year-long cyber-espionage campaign against South Korean defense companies... Read More
-
US Imposes Visa Restrictions on Alleged Spyware FiguresThe move is reportedly part of a broader effort to counter the misuse of surveillance technology... Read More
-
End-to-End Encryption Sparks Concerns Among EU Law EnforcementThe call comes amid the rollout of end-to-end encryption on Meta’s Messenger platform... Read More
-
Millions of Americans' Data Potentially Exposed in Change Healthcare HackMillions of Americans may be impacted by the Change Healthcare data breach as UnitedHealth confirms exposed data includes personal and health information... Read More
-
Vulnerability Exploitation on the Rise as Attacker Ditch PhishingMandiant’s latest M-Trends report found that vulnerability exploitation was the most common initial infection vector in 2023, making up 38% of intrusions... Read More
-
Russian Sandworm Group Hit 20 Ukrainian Energy and Water SitesNotorious APT44 group Sandworm launched a major campaign against Ukrainian critical infrastructure in March... Read More
-
Russian APT28 Group in New “GooseEgg” Hacking CampaignMicrosoft has warned of a long-running credential stealing campaign from Russia’s APT28... Read More
-
Fraudsters Exploit Telegram’s Popularity For Toncoin ScamThe scheme was uncovered by Kaspersky and has been operational since November 2023... Read More
-
Dependency Confusion Vulnerability Found in Apache ProjectThis occurs when a private package fetches a similar public one, leading to exploit due to misconfigurations in package managers... Read More
-
CrushFTP File Transfer Vulnerability Lets Attackers Download System FilesCrushFTP is urging customers to download v11 of its file transfer platform, with attackers actively exploiting a vulnerability that allows them to download system files... Read More
-
NSA Launches Guidance for Secure AI DeploymentThe new document is the first release from NSA’s Artificial Intelligence Security Center (AISC), in partnership with other government agencies in the US and other... Read More
-
How to Avoid Romance ScamsIt’s the romance scam story that plays out like a segment on a true crime show. It starts with a... The post How to Avoid... Read More
-
How to Protect Your Smartphone from SIM SwappingYou consider yourself a responsible person when it comes to taking care of your physical possessions. You’ve never left your wallet in... The post How to Protect... Read More
-
How to Tell If Your Text Message Is RealAccording to reports from the Federal Trade Commission’s Consumer Sentinel database, text message scams swindled $372 million from Americans in... The post How to Tell... Read More
-
How to Spot Dating ScamsFor years now, the popularity of online dating has been on the rise—and so have the number of online romance... The post How to Spot... Read More
-
How to Spot AI Audio Deepfakes at Election TimeWe’ve said it several times in our blogs — it’s tough knowing what’s real and what’s fake out there. And... The post How to Spot... Read More
-
How To Teach Your Kids About DeepFakesIs it real? Is it fake? Deepfake technology has certainly made everything far more complicated online. How do you know... The post How To Teach... Read More
-
Redline Stealer: A Novel ApproachA new packed variant of the Redline Stealer trojan was observed in the wild, leveraging Lua bytecode to perform malicious... The post Redline Stealer: A... Read More
-
How to Protect Yourself Against AI Voice Cloning AttacksImagine receiving a call from a loved one, only to discover it’s not them but a convincing replica created by... The post How to Protect... Read More
-
How Do You Manage Your Social Media Privacy?‘Ensure your privacy settings are set to the highest level’ – if you’ve been reading my posts for a bit... The post How Do You... Read More
-
How to Protect Your Streaming Accounts: Lessons from Roku’s Credential Stuffing AttackIn recent news, Roku, a leading streaming platform, reported that over 591,000 user accounts were affected by credential stuffing attacks.... The post How to Protect... Read More
-
To fight cyber extortion and ransomware, shift leftHow can organizations defend themselves more effectively against ransomware and other forms of cyber extortion? By “shifting left” and adopting proactive cybersecurity strategies to detect... Read More
-
Inside the 2022 Email Cyber Threat LandscapeKey trends and predictions you should know about... Read More
-
Attack on Security Titans: Earth Longzhi Returns With New TricksAfter months of dormancy, Earth Longzhi, a subgroup of advanced persistent threat (APT) group APT41, has reemerged using new techniques in its infection routine. This... Read More
-
To Keep Up With Cybersecurity Laws, Go 'Federal First'With new cybersecurity laws and regulations rolling out, the best way to maintain broad compliance is to align with the most stringent frameworks. In the... Read More
-
Global Cyber Risk Lowers to Moderate Level in 2H' 2022Trend’s seventh edition of the Cyber Risk Index (CRI) reveals an in-depth analysis of cyber threat and vulnerabilities... Read More
-
Rapture, a Ransomware Family With Similarities to ParadiseIn March and April 2023, we observed a type of ransomware targeting its victims via a minimalistic approach with tools that leave only a minimal... Read More
-
SSL vs. TLS: Which should you be using?You may wonder if you should choose SSL or TLS to secure your network. Explore the differences between the two communications protocols, use cases where... Read More
-
Update Now: PaperCut Vulnerability CVE-2023-27350 Under Active ExploitationTwo vulnerabilities in PaperCut have been found, and one of them is being actively exploited in the wild. This blog entry provides a summary of... Read More
-
Attackers Use Containers for Profit via TrafficStealerWe found TrafficStealer abusing open container APIs in order to redirect traffic to specific websites and manipulate engagement with ads.... Read More
-
Achieving Cloud Compliance Throughout Your MigrationPart of a secure cloud migration strategy is ensuring compliance of all the moving pieces. Just like your cloud journey, cloud compliance isn’t all about... Read More