24 Oct

Could you not? BlackByte ransomware slinger twists the knife with data stealer

At least one affiliate of the high-profile ransomware-as-a-service (RaaS) group BlackByte is using a custom tool to exfiltrate files from a victim’s network, a key

Author rabih
24 Oct

Hacktivists say they stole 100,000 emails from Iran’s nuclear energy agency

Iran’s Atomic Energy Organization has laughed off claims that the email systems of a subsidiary were compromised, revealing important operational data about a nuclear power

Author rabih
22 Oct

As Russia wages disinfo war, Ukraine’s cyber chief calls for global anti-fake news fight

As a hybrid offline and online war wages on in Ukraine, Viktor Zhora, who leads the country’s cybersecurity agency, has had a front-row seat of

Author rabih
22 Oct

Russia wages disinformation war. Ukraine’s cyber chief calls for global anti-fake news fight

As a hybrid offline and online war wages on in Ukraine, Viktor Zhora, who leads the country’s cybersecurity agency, has had a front-row seat of

Author rabih
21 Oct

Good news, URSNIF no longer a banking trojan. Bad news, it’s now a backdoor

URSNIF, the malware also known as Gozi that attempts to steal online banking credentials from victims’ Windows PCs, is evolving to support extortionware. As one

Author rabih
20 Oct

Oops, web trackers may have leaked 3 million patients’ info

A hospital network in Wisconsin and Illinois fears visitor tracking code on its websites may have transmitted personal information on as many as 3 million

Author rabih
20 Oct

What Is Smishing and Vishing, and How Do You Protect Yourself

Smishing and vishing are scams where criminals attempt to get users to click a fraudulent link through a phone text message, email, or voicemail. These

Author rabih
20 Oct

What Are Tailgating Attacks and How to Protect Yourself From Them

Whether you’re spending time on the web or working in the office, you want peace of mind knowing that you are in a safe environment.

Author rabih
20 Oct

How to Tell Whether a Website Is Safe or Unsafe

It’s important to know that not all websites are safe to visit. In fact, some sites may contain malicious software (malware) that can harm your

Author rabih
20 Oct

“This Connection Is Not Private” – What it Means and How to Protect Your Privacy

Have you ever been browsing online and clicked a link or search result that took you to a site that triggers a “your connection is

Author rabih
20 Oct

Cloud migration and the cyber skills shortage

Sponsored Post Shifting workloads and applications to the cloud is on every forward-thinking CIO’s wish list. It is also their worst nightmare. If they get

Author rabih
20 Oct

BlueBleed: Microsoft customer data leak claimed to be ‘one of the largest’ in years

Microsoft has confirmed a data leak linked to a misconfigured server for a cloud storage service but is disputing the extent of the problem. In

Author rabih
20 Oct

Student Insights on Cybersecurity Careers

Hi, our names are Aubrie, Kyle, and Lindsey! We participated in internships at the National Initiative for Cybersecurity Education (NICE) Program Office this past year.

Author rabih
20 Oct

President Biden still wants his cybersecurity labels on those smart devices

The Biden administration is pushing ahead with its drive to add cyber security labeling to consumer Internet of Things (IoT) devices, and may join other

Author rabih
20 Oct

Biden administration wants standard cyber security labelling for smart devices

The Biden administration has accelerated its efforts to add cyber security labelling for consumer Internet of Things (IoT) devices, and may join other nations in

Author rabih
20 Oct

Confidentiality in the cloud: the delicate bargain of trust

Sponsored Feature The concept behind Confidential Computing isn’t new – organisations have been using hardware-assisted technology to encrypt and decrypt data for a while now.

Author rabih
20 Oct

Health insurer’s infosec incident diagnosis goes from ‘take a chill pill’ to emergency ward

Australian health insurer Medibank has revealed it’s been contacted by a group that claims to have its customers’ data and is threatening to distribute it.

Author rabih
20 Oct

CISA warns of security holes in industrial Advantech, Hitachi kit

This week, the US government’s Cybersecurity and Infrastructure Security Agency (CISA) expanded its ever-growing list of vulnerability in industrial control systems (ICS) and critical infrastructure

Author rabih
Load moreLoadingAll items loaded