15 Sep

Ransomware crims saying ‘We’ll burn your data if you get a negotiator’ can’t be legally paid off anyway

A couple of ransomware gangs have threatened to start deleting files if targeted companies call in professional negotiators to help lower prices for decryption tools.

Author rabih
15 Sep

Ex-US intel, military trio were cyber-mercenaries for UAE, say prosecutors

Three former US intelligence and military operatives broke America’s weapons export and computer security laws by, among other things, helping the United Arab Emirates hijack

Author rabih
15 Sep

Operation ‘Harvest’: A Deep Dive into a Long-term Campaign

A special thanks to our Professional Services’ IR team, ShadowServer, for historical context on C2 domains, and Thomas Roccia/Leandro Velasco for malware analysis support. Executive

Author rabih
15 Sep

McAfee Defender’s Blog: Operation Harvest

Summary McAfee Enterprise’s Advanced Threat Research (ATR) team provided deep insight into a long-term campaign Operation Harvest. In the blog, they detail the MITRE Tactics

Author rabih
15 Sep

Microsoft’s end-of-summer software security cleanse crushes more than 80 bugs

Patch Tuesday For its September Patch Tuesday, Microsoft churned out fixes for 66 vulnerabilities alongside 20 Chromium security bugs in Microsoft Edge. Affected products include:

Author rabih
14 Sep

Krita art app users targeted by ransomware posing as paid ‘collaboration’ opportunities

Krita, an open-source cross-platform digital painting application, has become the latest victim of ransomware – but rather than being attacked directly, its name is being

Author rabih
14 Sep

Security bods boost Apple iPhone hardware attack research with iTimed toolkit

A trio of researchers at North Carolina State University (NC State) have released what they describe as a “novel research toolkit” for Apple’s iDevices –

Author rabih
14 Sep

Brits open doors for tech-enabled fraudsters because they ‘don’t want to seem rude’

Brits are too polite to tell phone scammers to “get stuffed”, “take a hike” or “sling yer ‘ook” when they impersonate so-called “trusted organisations” such

Author rabih
14 Sep

Thousands of internet-connected databases contain high or critical CVEs, says report by cloud security biz

After spending five years poring over port scan results, infosec firm Imperva reckons there’s about 12,000 vulnerability-containing databases accessible through the internet. The study also

Author rabih
14 Sep

What is a cyberattack surface and how can you reduce it?

Discover the best ways to mitigate your organization’s attack surface, in order to maximize cybersecurity. In almost all coverage of modern breaches you’ll hear mention

Author rabih
14 Sep

ExpressVPN bought for $1bn by Brit biz with an intriguing history in adware

UK-headquartered Kape Technologies announced on Monday it has acquired ExpressVPN in a $936m (£675m) cash and stocks deal, a move it claims will double its

Author rabih
14 Sep

ExpressVPN bought for $1bn by Brit biz with an intriguing history in ad-tech

UK-headquartered Kape Technologies announced on Monday it has acquired ExpressVPN in a $936m (£675m) cash and stocks deal, a move it claims will double its

Author rabih
13 Sep

Apple emergency patches fix zero-click iMessage bug used to inject NSO spyware

Apple on Monday issued security patches for its mobile and desktop operating systems, and for its WebKit browser engine, to address two security flaws, at

Author rabih
13 Sep

How a glitch in the Matrix led to apps potentially exposing encrypted chats

The Matrix.org Foundation, which oversees the Matrix decentralized communication protocol, said on Monday multiple Matrix clients and libraries contain a vulnerability that can potentially be

Author rabih
13 Sep

Open redirect on UK council website was being used for Royal Mail-themed parcel payments scam

An open redirect on a UK council-backed property website allowed low-level miscreants to evade filters. The website operated by tech services biz Civica had an

Author rabih
13 Sep

Smartphone Security: Five Steps Beating and Blocking Robocalls

Some scams can make a telltale sound—rinnng, rinnng! Yup, the dreaded robocall. Not only are they annoying, but they can also hit you in the pocketbook.   In the U.S., unwanted calls rank as the top consumer

Author rabih
13 Sep

Android malware distributed in Mexico uses Covid-19 to steal financial credentials

McAfee Mobile Malware Research Team has identified malware targeting Mexico. It poses as a security banking tool or as a bank application designed to report an out-of-service ATM. In both instances,

Author rabih
13 Sep

Virtual Events Amplify NIST’s Cybersecurity and Privacy International Engagements

Credit: Shutterstock/Anton Balazh For the past many months, NIST has taken advantage of the trend of online events to deepen our international engagement. NIST looked

Author rabih
Load moreLoadingAll items loaded