Facebook's Meta says bad actors are changing tactics as it takes down six more groups

Meta has detailed takedowns of what it described as six ‘adversarial networks’ from across the world that were using Facebook for behaviour including spreading false information, harassment and trying to…

Hackers are turning to this simple technique to install their malware on PCs

Nation state-backed hacking groups are exploiting a simple but effective new technique to power phishing campaigns for spreading malware and stealing information that’s of interest to their governments.  Cybersecurity researchers at Proofpoint say…

CrowdStrike chosen by CISA for government endpoint security intiative

CrowdStrike and CISA have announced a new partnership that will see the cybersecurity company provide endpoint security for the government organization — and others — while also “operationalizing” the Executive…

Stealthy ‘WIRTE’ Gang Targets Middle Eastern Governments

Kaspersky researchers suspect that the cyberattackers may be a subgroup of the politically motivated, Palestine-focused Gaza Cybergang. A threat actor tracked as WIRTE has been assaulting Middle East governments since…

Hybrid cloud brings benefits. But it also brings new cybersecurity risks, too

The use of cloud computing applications has grown significantly in the last two years as the Covid-19 pandemic forced many organisations to adapt to remote working. Many of those businesses…

Toss a Coin to your Helper (Part 2 of 2)

Avast –  Avast –  In the first posting of this series, we looked at a clipboard stealer belonging to the MyKings botnet. In this second part of the blog series,…

Development of Corporate Applications Based on Artificial Intelligence

Technologies based on Artificial intelligence can be used in corporate management since the indisputable advantage of these technologies is the ability to analyze large amounts of data without significant resource…

Will a Digital Bill of Rights solve machine learning and privacy issues?

AI-enabled systems now touch our daily lives, from image recognition to deciding if we like butter or not. Like a sleepwalking child, humanity seems to be blithely entering the age…

Yanluowang Ransomware Tied to Thieflock Threat Actor

Links between the tactics and tools demonstrated in attacks suggest a former affiliate has switched loyalties, according to new research. A threat actor previously tied to the Thieflock ransomware operation…

Spy chief's warning: Our foes are now 'pouring money' into quantum computing and AI

The rise of technologies like artificial intelligence (AI) and quantum computing is changing the world — and intelligence services must adapt in order to operate in an increasingly digital environment,…