04 Jun

Fake IT support calls hit 20 orgs, end in stolen Salesforce data and extortion, Google warns

A group of financially motivated cyberscammers who specialize in Scattered-Spider-like fake IT support phone calls managed to trick employees at about 20 organizations into installing

Author rabih
04 Jun

Crims stole 40,000 people’s data from our network, admits publisher Lee Enterprises

Regional newspaper publisher Lee Enterprises says data belonging to around 40,000 people was stolen during an attack on its network earlier this year. The Iowa-based

Author rabih
04 Jun

UK CyberEM Command to spearhead new era of armed conflict

Revealing more details about the Cyber and Electromagnetic (CyberEM) military domain, the UK’s Ministry of Defence (MoD) says “there are pockets of excellence” but improvements

Author rabih
04 Jun

Ukraine war spurred infosec vet Mikko Hyppönen to pivot to drones

Interview Mikko Hyppönen has spent the last 34 years creating security software that defends against criminals and state-backed actors, but now he’s moving onto drone

Author rabih
04 Jun

‘Deliberate attack’ deletes shopping app’s AWS and GitHub resources

The CEO of Indian grocery ordering app KiranaPro has claimed an attacker deleted its GitHub and AWS resources in a targeted and deliberate attack and

Author rabih
03 Jun

Meta pauses mobile port tracking tech on Android after researchers cry foul

Security researchers say Meta and Yandex used native Android apps to listen on localhost ports, allowing them to link web browsing data to user identities

Author rabih
03 Jun

You say Cozy Bear, I say Midnight Blizzard, Voodoo Bear, APT29 …

Opinion Microsoft and CrowdStrike made a lot of noise on Monday about teaming up with other threat-intel outfits to “bring clarity to threat-actor naming.” It’s

Author rabih
03 Jun

Google quietly pushes emergency fix for Chrome 0-day as exploit runs wild

Google revealed Monday that it had quietly deployed a configuration change last week to block active exploitation of a Chrome zero-day. Google Threat Analysis Group

Author rabih
03 Jun

X’s new ‘encrypted’ XChat feature seems no more secure than the failure that came before it

Elon Musk’s X social media platform is rolling out a new version of its direct messaging feature that the platform owner said had a “whole

Author rabih
03 Jun

Crooks fleece The North Face accounts with recycled logins

Joining the long queue of retailers dealing with cyber mishaps is outdoorsy fashion brand The North Face, which says crooks broke into some customer accounts

Author rabih
03 Jun

Microsoft patches the patch that put Windows 11 in a coma

Microsoft is patching another patch that dumped some PCs into recovery mode with an unhelpful error code. The glitch was caused by the May Patch

Author rabih
03 Jun

Illicit crypto-miners pouncing on lazy DevOps configs that leave clouds vulnerable

Up to a quarter of all cloud users are at risk of having their computing resources stolen and used to illicitly mine for cryptocurrency, after

Author rabih
03 Jun

Bling slinger Cartier tells customers to be wary of phishing attacks after intrusion

Global jewelry giant Cartier is writing to customers to confirm their data was exposed to cybercriminals that broke into its systems. The notification email, seen

Author rabih
02 Jun

Ukrainians smuggle drones hidden in cabins on trucks to strike Russian airfields

Ukraine claims it launched a cunning drone strike on Sunday against multiple Russian airbases, hitting over 40 military aircraft and inflicting an estimated $7 billion

Author rabih
02 Jun

US community bank says thieves drained customer data through third party hole

Community bank MainStreet Bancshares says thieves stole data belonging to some of its customers during an attack on a third-party provider. Showing how vendors along

Author rabih
02 Jun

Don’t let dormant accounts become a doorway for cybercriminals

Digital Security Do you have online accounts you haven’t used in years? If so, a bit of digital spring cleaning might be in order. Phil

Author rabih
02 Jun

Lumma infostealer takedown may have inflicted only a flesh wound as crew keeps pinching and selling data

Infosec In Brief Despite last week’s FBI announcement that it helped to take down the crew behind the Lumma infostealer, the malware continues to operate.

Author rabih
31 May

Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump

exclusive A mystery whistleblower calling himself GangExposed has exposed key figures behind the Conti and Trickbot ransomware crews, publishing a trove of internal files and

Author rabih
Load moreLoadingAll items loaded