11 Aug

20k security folks in the desert – Week in security with Tony Anscombe

Unsurprisingly, artificial intelligence took the center stage at this year’s edition of Black Hat, one of the world’s largest gatherings of cybersecurity professionals Source

Author rabih
11 Aug

Magento shopping cart attack targets critical vulnerability revealed in early 2022

Ecommerce stores using Adobe’s open source Magento 2 software are being targeted by an ongoing exploitation campaign based on a critical vulnerability that was patched

Author rabih
11 Aug

Black Hat 2023: Cyberwar fire-and-forget-me-not

What happens to cyberweapons after a cyberwar? Source

Author rabih
11 Aug

US Cyber Command boss says China’s spooky cyber skills still behind

The boss of US Cyber Command has opined that China’s cyber and surveillance capabilities are not ahead of, or even comparable to, to those of

Author rabih
10 Aug

There’s a good chance your VPN is vulnerable to privacy-menacing TunnelCrack attack

A couple of techniques collectively known as TunnelCrack can, in the right circumstances, be used by snoops to force victims’ network traffic to go outside

Author rabih
10 Aug

ESET Research Podcast: Unmasking MoustachedBouncer

Listen as ESET’s Director of Threat Research Jean-Ian Boutin unravels the tactics, techniques and procedures of MoustachedBouncer, an APT group taking aim at foreign embassies

Author rabih
10 Aug

Cyberbullying’s Impact on Both Society and Security

More than half of children say that a cyberbully targeted them online.  That disquieting stat comes from our recent global research on cyberbullying. Overall, 57%

Author rabih
10 Aug

Get your staff’s consent before you monitor them, tech inquiry warns

Companies that monitor their employees should only do so after they consult with and get consent from the staffers they are watching or tracking. That’s

Author rabih
10 Aug

MoustachedBouncer: Espionage against foreign diplomats in Belarus

Long-term espionage against diplomats, leveraging email-based C&C protocols, C++ modular backdoors, and adversary-in-the-middle (AitM) attacks… Sounds like the infamous Turla? Think again! Source

Author rabih
09 Aug

Nearly every AMD CPU since 2017 vulnerable to Inception data-leak attacks

AMD processor users, you have another data-leaking vulnerability to deal with: like Zenbleed, this latest hole can be to steal sensitive data from a running

Author rabih
09 Aug

Rapid7 prepares to toss 18% of workforce to cut costs

Rapid7 is initiating a restructuring process that will involve shedding 18 percent of its workforce after net losses widened over the most recent quarter. The

Author rabih
09 Aug

Northern Ireland police may have endangered its own officers by posting details online in error

A spreadsheet containing details of serving Northern Ireland police officers was mistakenly posted online yesterday, potentially endangering the safety of officers, given the volatile politics

Author rabih
09 Aug

This Election Season, Be on the Lookout for AI-generated Fake News

It’s that time of year again: election season! You already know what to expect when you flip on the TV. Get ready for a barrage

Author rabih
09 Aug

INTERPOL shutters ’16shop’ phishing-as-a-service outfit

INTERPOL has revealed a successful investigation into a phishing-as-a-service operation named “16shop” with arrests of alleged operators made in Indonesia and Japan and the platform

Author rabih
08 Aug

Microsoft, Intel lead this month’s security fix emissions

Patch Tuesday Microsoft’s August patch party seems almost boring compared to the other security fires it’s been putting out lately. Of the almost 90 flaws

Author rabih
08 Aug

UK voter data within reach of miscreants who hacked Electoral Commission

The IT infrastructure of the UK’s Electoral Commission was broken into by miscreants, who will have had access to names and addresses of voters, as

Author rabih
08 Aug

Cyber-extortionists pillage Colorado education dept

Data going back as far as nearly 20 years may have been stolen from the Colorado Department of Higher Education (CDHE) after ransomware extortionists breached

Author rabih
08 Aug

UK voter data exposed for over a year in attack on Electoral Commission

The UK’s Electoral Commission has been the subject of an online attack that may have exposed the names and addresses of voters, as well as

Author rabih
Load moreLoadingAll items loaded