Compromise assessment or threat hunting? What do organizations need?

Organizations worldwide are undergoing rapid digitization to keep up with the fast-paced world we live in today. While it is a good initiative, cloud computing and remote work setup have…

Hackers are turning to this simple technique to install their malware on PCs

Nation state-backed hacking groups are exploiting a simple but effective new technique to power phishing campaigns for spreading malware and stealing information that’s of interest to their governments.  Cybersecurity researchers at Proofpoint say…

Russian Bulletproof Hosting Kingpin Gets Five Years

Russian Bulletproof Hosting Kingpin Gets Five Years A Russian man has been sentenced to five years behind bars for his part in a bulletproof hosting venture that helped support countless…

Hackers could steal encrypted data now and crack it with quantum computers later, warn analysts

Beijing-backed hackers might soon start trying to steal encrypted data — such as biometric info, the identities of covert spies, and weapons designs — with a view to decrypting it…

Hackers are targeting this Microsoft Windows Installer flaw, say security researchers

Hackers have already created malware in a bid to exploit an elevation of privilege vulnerability in Microsoft’s Windows Installer. Microsoft released a patch for CVE-2021-41379, an elevation of privilege flaw…

Google: Half of compromised cloud instances have weak or no passwords

Online criminals are deploying cryptocurrency miners within just 22 seconds of compromising misconfigured cloud instances running on Google Cloud Platform (GCP). Cryptocurrency mining is by far the main malicious activity…

Black Friday shopping? FBI says beware of these holiday scams and phishing threats

With Thanksgiving underway and Black Friday sales about to arrive, the FBI has warned consumers to be wary of online-shopping scams and phishing attackers using big brands to steal online…

This chip flaw could have let malicious apps eavesdrop on Android phone users

Taiwanese chip maker MediaTek has addressed four vulnerabilities that could have allowed malicious apps to eavesdrop on Android phone users.  Three the of vulnerabilities, tracked as CVE-2021-0661, CVE-2021-0662 and CVE-2021-0663,…

Hit by ransomware? Make sure you don't make this first obvious mistake

Organisations that fall victim to a ransomware attack shouldn’t let the cyber criminals know they have cyber insurance – because if the attackers know that their victim holds an insurance…

Attackers Will Flock to Crypto Wallets, Linux in 2022: Podcast

That’s just the start of what cyberattackers will zero in on as they pick up APT techniques to hurl more destructive ransomware & supply-chain attacks, says Fortinet’s Derek Manky. Ransomware…