25 May

5 reasons why GDPR was a milestone for data protection

The landmark regulation changed everyone’s mindset on how companies worldwide collect and use the personal data of EU citizens It was May 25th, 2018, and

Author rabih
25 May

Quad nations pledge deeper collaboration on infosec, data-sharing, and more

Leaders of the Quad alliance – Australia, India, Japan, and the USA – met on Tuesday and revealed initiatives to strengthen collaboration on emerging technologies

Author rabih
25 May

About half of popular websites tested found vulnerable to account pre-hijacking

Two security researchers have identified five related techniques for hijacking internet accounts by preparing them to be commandeered in advance. And they claim that when

Author rabih
25 May

Indian stock markets given ten day deadline to file infosec report, secure board signoff

Indian IT shops have been handed another extraordinarily short deadline within which to perform significant infosec work. This time the source of the edict is

Author rabih
24 May

Predator spyware sold with Chrome, Android zero-day exploits to monitor targets

Spyware vendor Cytrox sold zero-day exploits to government-backed snoops who used them to deploy the firm’s Predator spyware in at least three campaigns in 2021,

Author rabih
24 May

Patch now: Zoom chat messages can infect PCs, Macs, phones with malware

Zoom has fixed a security flaw in its video-conferencing software that a miscreant could exploit with chat messages to potentially execute malicious code on a

Author rabih
24 May

Why You Need to Get a Family Technology Agreement Happening

There were multiple times during my digital parenting journey when I would have loved to put my head in the sand. Pretend that life was

Author rabih
24 May

Why do hackers keep coming back to attack you? Because they can

Webinar Hackers have a tendency to return to the scene of their crimes over and over again. But it’s not because they’re unimaginative creatures of

Author rabih
24 May

Facebook opens political ad data vaults to researchers

Meta’s ad transparency tools will soon reveal another treasure trove of data: advertiser targeting choices for political, election-related, and social issue spots. Meta said it

Author rabih
24 May

It’s 2022 and there are still malware-laden PDFs in emails exploiting bugs from 2017

HP’s cybersecurity folks have uncovered an email campaign that ticks all the boxes: messages with a PDF attached that embeds a Word document that upon

Author rabih
24 May

Screencastify fixes bug that would have let rogue websites spy on webcams

Screencastify, a popular Chrome extension for capturing and sharing videos from websites, was recently found to be vulnerable to a cross-site scripting (XSS) flaw that

Author rabih
23 May

How to find NPM dependencies vulnerable to account hijacking

Following the recent disclosure of a technique for hijacking certain NPM packages, security engineer Danish Tariq has proposed a defensive strategy for those looking to

Author rabih
23 May

Microsoft sounds the alarm on — wait for it — a Linux botnet

Microsoft has sounded the alarm on DDoS malware called XorDdos that targets Linux endpoints and servers. The trojan, first discovered in 2014 by security research

Author rabih
23 May

South Korean and US presidents gang up on North Korea’s cyber-offensives

US president Biden and South Korea’s new president Yoon Suk Yeol have pledged further co-operation in many technologies, including joint efforts to combat North Korea.

Author rabih
21 May

Conti: Russian-backed rulers of Costa Rican hacktocracy?

In brief The notorious Russian-aligned Conti ransomware gang has upped the ante in its attack against Costa Rica, threatening to overthrow the government if it

Author rabih
20 May

China-linked Twisted Panda caught spying on Russian defense R&D

Chinese cyberspies targeted two Russian defense institutes and possibly another research facility in Belarus, according to Check Point Research. The new campaign, dubbed Twisted Panda,

Author rabih
20 May

Sandworm uses a new version of ArguePatch to attack targets in Ukraine

ESET researchers spot an updated version of the malware loader used in the Industroyer2 and CaddyWiper attacks Sandworm, the APT group behind some of the

Author rabih
20 May

Microsoft patches the patch that broke Windows authentication

Microsoft has released an out-of-band patch to deal with an authentication issue that was introduced in the May 10 Windows update. Elizabeth Tyler, cyber security

Author rabih
Load moreLoadingAll items loaded