09 Feb

The ever-present state of cyber security alert

Webinar As artificial intelligence (AI) technology becomes increasingly complex so do the threats from bad actors. It is like a forever war. Half the time

Author rabih
09 Feb

Ransomware payments hit a record high in 2023 – Week in security with Tony Anscombe

Video, Ransomware Called a “watershed year for ransomware”, 2023 marked a reversal from the decline in ransomware payments observed in the previous year 09 Feb

Author rabih
09 Feb

India to make its digital currency programmable

The Reserve Bank of India (RBI) announced on Thursday it would make its digital currency programmable, and ensure it can be exchanged when citizens are

Author rabih
09 Feb

Crime gang targeted jobseekers across Asia, looted two million email addresses

Singapore-based infosec firm Group-IB has detected a group that spent the last two months of 2023 stealing personal info from websites operated by jobs boards

Author rabih
09 Feb

Uncle Sam sweetens the pot with $15M bounty on Hive ransomware gang members

The US government has placed an extra $5 million bounty on Hive ransomware gang members – its second such reward in a year. And it

Author rabih
09 Feb

FBI: Give us warrantless Section 702 snooping powers – or China wins

Analysis The FBI’s latest PR salvo, as it fights to preserve its warrantless snooping powers on Americans via FISA Section 702, is more big talk

Author rabih
08 Feb

Fake LastPass lookalike made it into Apple App Store

LastPass says a rogue application impersonating its popular password manager made it past Apple’s gatekeepers and was listed in the iOS App Store for unsuspecting

Author rabih
08 Feb

Raspberry Robin devs are buying exploits for faster attacks

Researchers suspect the criminals behind the Raspberry Robin malware are now buying exploits for speedier cyberattacks. An exploit developer is thought by infosec pros to

Author rabih
08 Feb

Cybercrime duo accused of picking $2.5M from Apple’s orchard

A cybersecurity researcher and his pal are facing charges in California after they allegedly defrauded an unnamed company, almost certainly Apple, out of $2.5 million.

Author rabih
08 Feb

NIST’s International Cybersecurity and Privacy Engagement Update – International Dialogues, Workshops, and Translations

Credit: Shutterstock/Michael Traitov With the new year under way, NIST is continuing to engage with our international partners to enhance cybersecurity.  Here are some updates

Author rabih
08 Feb

The buck stops here: Why the stakes are high for CISOs

Business Security Heavy workloads and the specter of personal liability for incidents take a toll on security leaders, so much so that many of them

Author rabih
08 Feb

MoqHao evolution: New variants start automatically right after installation

Authored by Dexter Shin  MoqHao is a well-known Android malware family associated with the Roaming Mantis threat actor group first discovered in 2015. McAfee Mobile

Author rabih
08 Feb

Rust can help make software secure – but it’s no cure-all

Memory-safety flaws represent the majority of high-severity problems for Google and Microsoft, but they’re not necessarily associated with the majority of vulnerabilities that actually get

Author rabih
08 Feb

IT suppliers hacked off with Uncle Sam’s demands in aftermath of cyberattacks

Organizations that sell IT services to Uncle Sam are peeved at proposed changes to procurement rules that would require them to allow US government agencies

Author rabih
07 Feb

Volt Typhoon not the only Chinese crew lurking in US energy, critical networks

Volt Typhoon isn’t the only Chinese spying crew infiltrating computer networks in America’s energy sector and other critical organizations with the aim of wrecking equipment

Author rabih
07 Feb

Half of polled infosec pros say their degree was less than useful for real-world work

Half of infosec professionals polled by Kaspersky said any cybersecurity knowledge they picked up from their higher education is at best somewhat useful for doing

Author rabih
07 Feb

US says China’s Volt Typhoon is readying destructive cyberattacks

The US government today confirmed that China’s Volt Typhoon crew comprised “multiple” critical infrastructure org’s IT networks, and warned that the state-sponored hackers are readying

Author rabih
07 Feb

Generative AI: Cross the Stream Where it is Shallowest

The explosive growth of Generative AI has sparked many questions and considerations not just within tech circles, but in mainstream society in general. Both the

Author rabih
Load moreLoadingAll items loaded