02 Feb

Grandoreiro banking malware disrupted – Week in security with Tony Anscombe

Video The banking trojan, which targeted mostly Brazil, Mexico and Spain, blocked the victim’s screen, logged keystrokes, simulated mouse and keyboard activity and displayed fake

Author rabih
02 Feb

Interpol’s latest cybercrime intervention dismantles ransomware, banking malware servers

Interpol has arrested 31 people following a three-month operation to stamp out various types of cybercrime. Spanning 55 countries, from Albania to Australia, Operation Synergia

Author rabih
02 Feb

Wikileaks source and former CIA worker Joshua Schulte sentenced to 40 years jail

Joshua Schulte, a former CIA employee and software engineer accused of sharing material with WikiLeaks, was sentenced to 40 years in prison by the US

Author rabih
02 Feb

Managing the hidden risks of shadow APIs

Partner Content Application programming interfaces (APIs) play a significant role in today’s digital economy, but at the same time they can also represent a data

Author rabih
02 Feb

Cloudflare sheds more light on Thanksgiving security breach in which tokens, source code accessed by suspected spies

Cloudflare has just detailed how suspected government spies gained access to its internal Atlassian installation using credentials stolen via a security breach at Okta in

Author rabih
01 Feb

Ransomware payment rates drop to new low – now ‘only 29% of victims’ fork over cash

Trusting a ransomware crew to honor a deal isn’t the greatest idea, and the world seems to be waking up to that. It’s claimed that

Author rabih
01 Feb

Rise of deepfake threats means biometric security measures won’t be enough

Cyber attacks using AI-generated deepfakes to bypass facial biometrics security will lead a third of organizations to doubt the adequacy of identity verification and authentication

Author rabih
01 Feb

Congress told how Chinese goons plan to incite ‘societal chaos’ in the US

Chinese attackers are preparing to “wreak havoc” on American infrastructure and “cause societal chaos” in the US, infosec, and law enforcement bosses told a US

Author rabih
01 Feb

Rise of deepfake threats mean biometric security measures won’t be enough

Cyber attacks using AI-generated deepfakes to bypass facial biometrics security will lead a third of organizations to doubt the adequacy of identity verification and authentication

Author rabih
01 Feb

Biden will veto attempts to kill off SEC’s security breach reporting rules

The Biden administration has expressed to congressional representatives its strong opposition to undoing the Securities and Exchange Commission’s (SEC) strict data breach reporting rule. In

Author rabih
01 Feb

Biden will veto attempts to rip up SEC breach reporting rule

The Biden administration has expressed to congressional representatives its strong opposition to undoing the Securities and Exchange Commission’s (SEC) strict data breach reporting rule. In

Author rabih
01 Feb

LockBit shows no remorse for ransomware attack on children’s hospital

Ransomware gang LockBit is claiming responsibility for an attack on a Chicago children’s hospital in an apparent deviation from its previous policy of not targeting

Author rabih
01 Feb

VajraSpy: A Patchwork of espionage apps

ESET researchers have identified twelve Android espionage apps that share the same malicious code: six were available on Google Play, and six were found on

Author rabih
01 Feb

Congress told how Chinese attackers plan to incite ‘societal chaos’ in the US

Chinese attackers are preparing to “wreak havoc” on American infrastructure and “cause societal chaos” in the US, infosec, and law enforcement bosses told a US

Author rabih
31 Jan

FBI confirms it issued remote kill command to blow out Volt Typhoon’s botnet

China’s Volt Typhoon attackers used “hundreds” of outdated Cisco and NetGear routers infected with malware in an attempt to break into US critical infrastructure facilities,

Author rabih
31 Jan

Ransomware payment rates drop to new low – only 29% of victims are forking over cash

Trusting a ransomware crew to honor a deal isn’t the greatest idea, and the world seems to be waking up to that. The number of

Author rabih
31 Jan

Nearly 4-year-old Cisco vuln linked to recent Akira ransomware attacks

Security researchers believe the Akira ransomware group could be exploiting a nearly four-year-old Cisco vulnerability and using it as an entry point into organizations’ systems.

Author rabih
31 Jan

We know nations are going after critical systems, but what happens when crims join in?

Volt Typhoon, the Chinese government-backed cyberspies whose infrastructure was at least partially disrupted by Uncle Sam, has been honing in on other US energy, satellite

Author rabih
Load moreLoadingAll items loaded