The first Arm-based laptops with Microsoft’s Pluton security co-processor have arrived in the form of Lenovo’s new ThinkPad X13s, which features Qualcomm’s latest Snapdragon 8cx Gen 3 chipset. …
Day: March 2, 2022
#CCSE22: The Need to Change Course in User Cybersecurity Training
Professor Steven Purnell discusses why organizations should take a completely new approach to staff security training
TeaBot Trojan Resurfaces into Google Play Store
Once more, the banking trojan dubbed TeaBot was discovered in the Google Play Store, this time disguised as a QR code app that spread to over 10,000 devices. This is…
Conti Ransomware’s Source Code Is Now Public
Following the invasion of Ukraine, a member of the Conti ransomware group believed to be of Ukrainian origin, leaked the gang’s internal communications after the group’s leaders posted an aggressive…
NVIDIA Data Breach Confirmed by the Company
A cyberattack impacted Nvidia’s network last week, the popular chipmaker confirmed, threat actors achieving access to confidential and employees’ login information. The extortion group that claimed this cyberattack is dubbed…
DDOs attackers have found this new trick to knock over websites
Distributed denial of service (DDoS) attackers are using a new technique to knock websites offline by targeting vulnerable ‘middleboxes’, such as firewalls, to amplify junk traffic attacks. Amplification attacks are…
Creating a Cybersecurity Talent Pool from Within Your Organization
by Heather Monthie, PhD One of the most difficult tasks of a cybersecurity leader in any organization is to find new employees to fill critical cybersecurity positions in your organization.…
TeaBot Android Banking Trojan continues its global conquest with new upgrades
The TeaBot Remote Access Trojan (RAT) has been upgraded, leading to a huge increase in both targets and spread worldwide. Ukraine Crisis On March 1, the Cleafy research team said…
Ghostwriter Group Targets NATO Refugee Effort
Proofpoint warns of new phishing campaign from Belarusian state
Nvidia Admits Hackers Stole Employee and Internal Data
Attackers claim to have IP which could increase capacity for crypto-mining