HelloKitty Ransomware Adds New Extortion Tactics

It was in January 2021 when HelloKitty was identified as a ransomware operational group by the FBI; nevertheless, it looks like new data points to them being active since as…

Can AI Win the Battle for Cybersecurity Companies?

Here’s my topic for the month: AI in cybersecurity. From healthcare applications to online shopping personal recommendations (or even Spotify or Netflix, actually) and online banking applications, AI (artificial intelligence)…

Election Day poses first security test for Biden officials, overhauled voting laws

Written by Tim Starks Nov 2, 2021 | CYBERSCOOP Voting in more than 30 states on Tuesday is poised to serve as the initial test run for election security officials…

Vulnerability in WP DSGVO Tools (GDPR) Plugin Allows Unauthenticated Page Deletion

WordFence –  WordFence –  Note: To receive disclosures like this in your inbox the moment they’re published, you can subscribe to our WordPress Security Mailing List. On September 27, 2021,…

Group Policy Objects: Definition, Types and Examples

Group Policy Objects, also known as GPOs, are basically a collection of rules, a virtual policy settings compilation. In this article, you’ll find what group policy objects are, how many…

Phishing attacks are harder to spot on your smartphone. That's why hackers are using them more

There’s been a surge in mobile phishing attacks targeting the energy sector as cyber attackers attempt to break into networks used to provide services including electricity and gas.  The energy…

The ‘Trojan Source’ Attack Method Allows the Injection of Vulnerabilities Into Open-Source Code

Unfortunately, by using this method the vulnerabilities cannot be detected by human reviewers. To build vulnerable binaries, Trojan Source uses a simple method that does not need to alter the…

Toronto subways hit by ransomware as US lawmakers slam 'burdensome' cybersecurity rules

Special feature Cyberwar and the Future of Cybersecurity Today’s security threats have expanded in scope and seriousness. There can now be millions — or even billions — of dollars at…

Cyberattack Impacts Canadian Province HealthCare Network

A cyberattack on Newfoundland and Labrador, the easternmost province of Canada, has resulted in significant disruption for healthcare providers and medical facilities. The incident occurred on October 30th, causing regional…

56% of UK Businesses Plan to Hire a CISO

56% of UK Businesses Plan to Hire a CISO More than half (56%) of UK businesses plan to employ a chief information security officer (CISO) in the next 6-24 months…