Tax identity theft: How to protect your credit and finances

Tax-related identity theft is a persistent problem in the US. In fact, the IRS’s Criminal Investigation Division reported that it identified $2.3 billion in tax fraud in fiscal year 2020,…

Canadian Citizen Charged for Ransomware Attacks in Alaska

The accused became a suspect when the FBI contacted Canadian intelligence after observing a surge in ransomware attacks in Alaska in 2018. The Ontario Provincial Police (OPP) has announced that…

New Yanluowang Ransomware Found to be Code-Signed, Terminates Database-Related Processes

Trend Micro – Trend Micro – New Yanluowang Ransomware Found to be Code-Signed, Terminates Database-Related Processes Ransomware We analyzed new samples of the Yanluowang ransomware. One interesting aspect of these…

Canadian Ransomware Arrest Is a Meaningful Flex, Experts Say

U.S. and Canada charge Ottawa man for ransomware attacks, signaling that North America is no cybercriminal haven. Investigations that ran in parallel over nearly two years by Canadian and U.S.…

Windows 10 Drive-By RCE Triggered by Default URI Handler

There’s an argument injection weakness in the Windows 10/11 default handler, researchers said: an issue that Microsoft has only partially fixed. Researchers have discovered a drive-by remote code-execution (RCE) bug…

Aruba rolls out “Microbranch” networking to level up home offices

The HPE-owned company Aruba on Tuesday is rolling out a new networking solution that promises to bring office-level networking capabilities to home offices via a single Wi-Fi access point (AP). …

Ramping Up Malware Hunting with Heimdal™

In one of my previous articles, I discussed AI and its critical role in today’s – and tomorrow’s – world, particularly in terms of cybersecurity. I’m certain that AI (and…

Are You Guilty of These 8 Network-Security Bad Practices?

Tony Lauro, director of Security Technology & Strategy at Akamai, discusses VPNs, RDP, flat networks, BYOD and other network-security bugbears. They say the first step in addressing a serious issue…

Australia commences work on electronic surveillance law reforms

The Australian government has commenced work to reform the country’s electronic surveillance laws that have been labelled as overly complex, inconsistent, and incompatible with the current technology landscape. The federal…

Vulnerabilities Exploited for Monero Mining Malware Delivered via GitHub, Netlify

Trend Micro – Trend Micro – Vulnerabilities Exploited for Monero Mining Malware Delivered via GitHub, Netlify We looked into exploitation attempts we observed in the wild and the abuse of…