16 Dec

National Cyber Strategy will lead to BritChip for mobile devices by 2025, claims UK.gov

The British government has launched a £2.6bn National Cyber Strategy, intended to steer the state’s thinking on cyber attack, defence and technology for the next

Author rabih
16 Dec

Japan draws a LINE: web giants must reveal where they store user data

Social media and search engine operators in Japan will be required to specify the countries in which users’ data is physically stored, under a planned

Author rabih
16 Dec

Facebook expands bug bounty program to include scraping attacks, two years after it was scraped – hard

Meta has expanded its bug bounty program to include payouts for reports of scraping attacks on Facebook – but hold your applause. The antisocial network

Author rabih
15 Dec

As CISA tells US govt agencies to squash Log4j bug by Dec 24, fingers start pointing at China, Iran, others

Microsoft reckons government cyber-spies in China, Iran, North Korea, and Turkey are actively exploiting the Log4j 2.x remote-code execution hole. Up until now, it was

Author rabih
15 Dec

US lawmakers want to put NSO Group, 3 other spyware makers out of business with fresh severe sanctions

Eighteen US Democratic lawmakers have asked the Treasury Department and State Department to punish Israel-based spyware maker NSO Group and three other surveillance software firms

Author rabih
15 Dec

What every business leader needs to know about Log4Shell

Hundreds of thousands of attempts to exploit the vulnerability are under way In many cases, updating IT systems and patching security vulnerabilities is a quiet

Author rabih
15 Dec

Pen Test Partners: Anyone could view Gumtree users’ GPS location by pressing F12

UK online used goods bazaar Gumtree exposed its users’ home addresses in the source code of its webpages, and then tried to squirm out of

Author rabih
15 Dec

Quizzes and Other Identity Theft Schemes to Avoid on Social Media

Before you take the fun-looking quiz that popped up in your social media feed, think twice. The person holding the answers may be a hacker.  Where people go, hackers are sure

Author rabih
15 Dec

NIST Launches New International Cybersecurity and Privacy Resources Website

Credit: Shutterstock Every day, NIST cybersecurity and privacy resources are being used throughout the world to help organizations manage cybersecurity and privacy risks. To assist

Author rabih
15 Dec

The dirty dozen of Latin America: From Amavaldo to Zumanek

The grand finale of our series dedicated to demystifying Latin American banking trojans ESET started this blogpost series dedicated to demystifying Latin American banking trojans

Author rabih
15 Dec

Microsoft closes installer hole abused by Emotet malware, Google splats Chrome bug exploited in the wild

Patch Tuesday It’s not just Log4j you need to worry about this week. It’s the final Patch Tuesday of the year. If you haven’t already

Author rabih
14 Dec

Apache takes off, nukes insecure feature at the heart of Log4j from orbit with v2.16

Last week, version 2.15 of the widely used open-source logging library Log4j was released to tackle a critical security hole, dubbed Log4Shell, which could be

Author rabih
14 Dec

Apache dusts off, nukes insecure feature at the heart of Log4j from orbit with v2.16

Last week, version 2.15 of the widely used open-source logging library Log4j was released to tackle a critical security hole, dubbed Log4Shell, which could be

Author rabih
14 Dec

You may have cracked serverless development, but it’s almost certain you haven’t solved serverless security

Paid Post Serverless is revolutionizing software development, allowing organizations to produce applications which consume cloud resources only when they need to. Developing applications this way

Author rabih
14 Dec

Popular password manager LastPass to be spun out from LogMeIn

One of the biggest beasts in the password management world, LastPass, is being spun out from parent LogMeIn as a “standalone cloud security” organisation. “The

Author rabih
14 Dec

MPs charged with analysing Online Safety Bill say end-to-end encryption should be called out as ‘specific risk factor’

Britain’s Online Safety Bill is being enthusiastically endorsed in a “manifesto” issued today by MPs who were tasked with scrutinising its controversial contents. Parliament’s Joint

Author rabih
13 Dec

Log4j RCE latest: In case you hadn’t noticed, this is Really Very Bad, exploited in the wild, needs urgent patching

Miscreants are wasting no time in using the widespread Log4j vulnerability to compromise systems, with waves and waves of live exploit attempts focused mainly –

Author rabih
13 Dec

Log4Shell vulnerability: What we know so far

The critical flaw in the ubiquitous Log4j utility has sent shockwaves far beyond the security industry – here’s what we know so far Just as

Author rabih
Load moreLoadingAll items loaded