Brace yourself for these five top data breach trends in 2022, Experian warns

In its latest annual Data Breach Industry Forecast released Monday, credit bureau and information services company Experian said that it has identified five areas it believes cybercriminals will find opportunities…

Twitter Verified Accounts Targeted as Part of a Large Phishing Attempt

On Twitter, verified accounts are those that have a blue badge with a checkmark. These accounts often represent well-known influencers, celebrities, politicians, journalists, activists, as well as government and commercial…

Enter the Heimdal™ Social Media Giveaway for a Chance to Win Holiday Goodies

Happy holidays from us to you! As the gift-giving season draws near, we are very excited to announce our first time ever social media giveaway! Make sure you follow us…

Retail Cybersecurity: Common Threats During the Holiday Shopping Season

With Black Friday past us and Cyber Monday turning into a Cyber Week — the holiday shopping season has started out with a bang. For many retailers, this season is…

ASIC says financial market cyber resiliency remained steady but fell short of target

Firms in Australia’s financial market have continued to be resilient against cyber threats, with improvement rates in cyber resiliency remaining steady, the Australian Securities and Investment Commission (ASIC) reported on…

NSO Group tech reportedly used to hack US officials' iPhones

Written by AJ Vicens Dec 3, 2021 | CYBERSCOOP Nearly a dozen iPhones associated with U.S. State Department employees were hacked using spyware developed by Israel-based NSO Group, Reuters first…

The Justice Department is ramping up its crackdown on money mules

Written by Tonya Riley Dec 3, 2021 | CYBERSCOOP U.S. law enforcement recovered nearly $3.7 million in fraud proceeds and charged more than 30 individuals for their alleged involvement in…

Bitdefender Named a 2021 Gartner Peer Insights Customers’ Choice for Endpoint Protection Platforms in North America

The Bitdefender team is excited to share that we have been named a ‘Customers’ Choice’ for North America in the 2021 Peer Insights ‘Voice of the Customer’: Endpoint Protection Platforms…

What Is Privilege Escalation? Definition, Types and Examples

Privilege escalation might be a confusing cybersecurity term for many. That’s why in this article we’re going to shed a little bit more light on this topic. Keep reading to…

The In-house Zoho ServiceDesk Exploit Used to Drop Webshells

You may recall that we reported a while ago that state-backed advanced persistent threat (APT) organizations had been actively exploiting a significant hole in a Zoho single sign-on and password…