Meta removes accounts of spyware company Cytrox after Citizen Lab report on gov't hacks

Citizen Lab has released a new report highlighting widespread government use of the “Predator” spyware from North Macedonian developer Cytrox. Researchers found that Predator was used to attack two people…

60% of UK Workers Have Been Victim of a Cyber-Attack, Yet Awareness Remains Low

60% of UK Workers Have Been Victim of a Cyber-Attack, Yet Awareness Remains Low There is a “dangerous” lack of awareness among UK workers towards cybersecurity, leaving businesses at risk…

Cobalt Strike Is Being Installed by Emotet for Faster Attacks

Emotet belongs to the malware strain known as banking Trojans, and it primarily spreads through malspam. The messages used by Emotet often contain familiar branding, mimicking the email format of well-known…

OAIC determines AFP interfered with privacy of Australians after using Clearview AI

In an investigation conducted by Australia’s Information Commissioner (OAIC), it has found the Australian Federal Police’s (AFP) use of the Clearview AI platform interfered with the privacy of Australian citizens.…

Relentless Log4j Attacks Include State Actors, Possible Worm

More than 1.8 million attacks, against half of all corporate networks, have already launched to exploit Log4Shell. Call it a “logjam” of threats: Attackers including nation-state actors have already targeted…

Cybersecurity experts debate concern over potential Log4j worm

As the fallout from the Log4j vulnerability continues, cybersecurity experts are debating what the future might hold.  Tom Kellermann, VMware’s head of cybersecurity strategy, said the Log4j vulnerability is one…

DHS Launches Bug Bounty Program

DHS Launches Bug Bounty Program The United States Department of Homeland Security has launched a new bug bounty program to identify potential cybersecurity vulnerabilities and increase the department’s cybersecurity resilience. …

New “Hack DHS” program will pay up to $5,000 for discovered vulnerabilities

The US Department of Homeland Security is launching its own bug bounty program to help find and correct gaps in its systems.  more coverage The new “Hack DHS” program was…

Ransomware in 2022: We're all screwed

Ransomware is now a primary threat for businesses, and with the past year or so considered the “golden era” for operators, cybersecurity experts believe this criminal enterprise will reach new…

A List of Vulnerable Products to the Log4j Vulnerability

Two days ago, we wrote a post about the Log4j vulnerability that is currently wreaking havoc on the cyberthreat landscape. The flaw stands for an open-source Java logging library. By…