27 May

Let’s play everyone’s favorite game: REvil? Or Not REvil?

Akamai has spoken of a distributed denial of service (DDoS) assault against one of its customers during which the attackers astonishingly claimed to be associated

Author rabih
27 May

China offering ten nations help to run their cyber-defenses and networks

China has begun talking to ten nations in the South Pacific with an offer to help them improve their network infrastructure, cyber security, digital forensics

Author rabih
27 May

How to reprogram Apple AirTags, play custom sounds

At the Workshop on Offensive Technologies 2022 (WOOT) on Thursday, security researchers demonstrated how to meddle with AirTags, Apple’s coin-sized tracking devices. Thomas Roth (Leveldown

Author rabih
26 May

Ransomware encrypts files, demands three good deeds to restore data

In what is either a creepy, weird spin on Robin Hood or something from a Black Mirror episode, we’re told a ransomware gang is encrypting

Author rabih
26 May

Cheers ransomware hits VMware ESXi systems

Another ransomware strain is targeting VMware ESXi servers, which have been the focus of extortionists and other miscreants in recent months. ESXi, a bare-metal hypervisor

Author rabih
26 May

Campaigners warn of legal challenge against Privacy Shield enhancements

European privacy campaigner Max Schrems is warning that enhancements to the EU-US Privacy Shield data-sharing arrangements might face a legal challenge if negotiators don’t take

Author rabih
26 May

The Cornerstone of Cybersecurity – Cryptographic Standards and a 50-Year Evolution

In today’s connected digital world, cryptographic algorithms are implemented in every device and applied to every link to protect information in transmission and in storage.

Author rabih
26 May

Verizon: Ransomware sees biggest jump in five years

The cybersecurity landscape continues to expand and evolve rapidly, fueled in large part by the cat-and-mouse game between miscreants trying to get into corporate IT

Author rabih
26 May

Suspected phishing email crime boss cuffed in Nigeria

Interpol and cops in Africa have arrested a Nigerian man suspected of running a multi-continent cybercrime ring that specialized in phishing emails targeting businesses. His

Author rabih
26 May

Ex-spymaster and fellow Brexiteers’ emails leaked by suspected Russian op

Emails between leading pro-Brexit figures in the UK have seemingly been stolen and leaked online by what could be a Kremlin cyberespionage team. The messages

Author rabih
26 May

Crypto Scammers Exploit: Elon Musk Speaks on Cryptocurrency

By Oliver Devane  Update: In the past 24 hours (from time of publication)  McAfee has identified 15 more scam sites bringing the total to 26.

Author rabih
26 May

Ransomware grounds some flights at Indian budget airline SpiceJet

Indian budget airline SpiceJet on Wednesday attributed delayed flights to a ransomware attack. SpiceJet said the attack was quickly contained and rectified with flights again

Author rabih
25 May

Millions of people’s info stolen from MGM Resorts dumped on Telegram for free

Miscreants have dumped on Telegram more than 142 million customer records stolen from MGM Resorts, exposing names, postal and email addresses, phone numbers, and dates

Author rabih
25 May

Advancing our Secure Home Platform with DNS over HTTPS

On the internet, the Domain Name System (DNS) is the way regular people access websites such as ESPN.com or BBC.com. However, the internet uses a

Author rabih
25 May

In record year for vulnerabilities, Microsoft actually had fewer

Despite a record number of publicly disclosed security flaws in 2021, Microsoft managed to improve its stats, according to research from BeyondTrust. Figures from the

Author rabih
25 May

Vehicle owner data exposed in GM credential stuffing attack

Car manufacturer General Motors has confirmed the credential stuffing attack it suffered last month exposed customers’ names, personal email addresses, and destination data, as well

Author rabih
25 May

Seven Tips for Protecting Your Internet-Connected Healthcare Devices

October is Cybersecurity Awareness Month, which is led by the U.S. government’s Cybersecurity and Infrastructure Security Agency (CISA) in conjunction with the National Cyber Security

Author rabih
25 May

Beijing needs the ability to ‘destroy’ Starlink, say Chinese researchers

A researcher from the Beijing Institute of Tracking and Telecommunications advocated for Chinese military capability to take out Starlink satellites on the grounds of national

Author rabih
Load moreLoadingAll items loaded