Tech companies are selling domains suggesting illegal sales of guns, malware

Written by Tonya Riley Jun 21, 2022 | CYBERSCOOP Popular domain registrars put up few barriers for those seeking to acquire domains suggesting illegal activities, according to a report from…

Meta removes accounts of spyware company Cytrox after Citizen Lab report on gov't hacks

Citizen Lab has released a new report highlighting widespread government use of the “Predator” spyware from North Macedonian developer Cytrox. Researchers found that Predator was used to attack two people…

‘DarkWatchman’ RAT Shows Evolution in Fileless Malware

The new tool manipulates Windows Registry in unique ways to evade security detections and is likely being used by ransomware groups for initial network access. A novel remote access trojan…

Why a skills shortage is one of the biggest security challenges for companies

Almost every company building an application needs to secure it, and yet all of them face an enormous constraint: talent.  Security requires a highly specialized skill set, which is in…

Log4j flaw could be a problem for industrial networks 'for years to come'

Industrial networks are among those which are vulnerable to the recently disclosed zero-day in the Log4j2 Java logging library, security researchers have warned. The vulnerability (CVE-2021-44228) was disclosed on December…

iOS 15.2’s App Privacy Report: How to turn it on, and what it all means

ErickPHOTOPRO — Shutterstock Apple just released iOS 15.2 and iPadOS 15.2 . The iPhone and iPad updates are available to install right now, bringing with them a new Digital Legacy…

Karakurt: Another Threat Actor Group on the Cyberthreat Landscape

Accenture’s team of researchers has identified a threat actor group dubbed Karakurt, as the group calls itself. The hacking gang was first discovered during the month of June this year.…

All You Need to Know About the New Zero-Day Found in the Log4j Java Library

Log4j 2 is a Java logging library that is open source and extensively used in a variety of software applications and services throughout the world. The flaw gives threat actors…

Hackers Use QR Codes to Steal Banking Credentials in Recent Phishing Attempts

Over the last few weeks, a new phishing operation focusing on e-banking users from Germany has been in progress, using QR codes during the credential-stealing operation. As explained by BleepingComputer,…

HSE Missed Cyber-attack’s Warning Signs

HSE Missed Cyber-attack’s Warning Signs An investigation into the springtime cyber-attack on HSE Ireland has found that criminals spent two months inside the healthcare system's computer network before deploying ransomware.…