Google to wipe user location history for visits to healthcare clinics, domestic violence shelters

Google says it will automatically delete location logs when it detects visits to abortion clinics and domestic violence shelters. In a blog post, Jen Fitzpatrick, senior vice president of Google…

This is the ultimate security key. Here's why you need one

It’s not often that I say you absolutely need to buy something. But this is something you need to buy. Two-factor authentication — a combination of something you remember (such…

Operation 404: Brazilian authorities crack down on piracy in the metaverse

Brazil’s Ministry of Justice and Public Security announced that it has carried out its first search within the metaverse as part of an operation aimed at tackling digital piracy and…

Infostealer Comparison: Top Stealers in 2022

To help protect the public, Morphisec Labs constantly monitors, investigates, and assesses the latest threats to help organizations avoid serious consequences. In recent months, threats involving infostealers have escalated. This…

Latest Cyberattack Against Iran Part of Ongoing Campaign

Iran’s steel manufacturing industry is victim to ongoing cyberattacks that previously impacted the country’s rail system. Malware used in a crippling cyberattacks against an Iranian steel plants last week is…

CISA: Here's how to apply this key Windows patch without breaking certificate authentication

The Cybersecurity & Infrastructure Security Agency (CISA) is now advising federal agencies and others to patch a Windows flaw from Microsoft’s May Patch Tuesday.  CISA has re-added the Windows flaw…

AstraLocker Ransomware Goes Offline and Makes Decryptors Available

Another one bites the dust, we might say. It has been recently made public that the cybercriminal responsible for the not-so-famous AstraLocker ransomware is ceasing operations and intends to switch…

Researcher Spotlight: Around the security world and back again with Nick Biasini

By Jon Munshaw.  Nick Biasini’s seen it all.   Going on a nearly 20-year security career, he’s been a part of some of Cisco Talos’ largest undertakings in the company’s history.…

Google Patches Actively Exploited Chrome Bug

The heap buffer overflow issue in the browser’s WebRTC engine could allow attackers to execute arbitrary code. While people were celebrating the Fourth of July holiday in the United States,…

China data breach likely to fuel identity fraud, smishing attacks

Businesses in China should brace themselves for a potential spike in smishing attacks and identity theft, following reports that the personal data of 1 billion residents in the country has…