UK in Midst of $200m Crypto Fraud Epidemic

UK in Midst of $200m Crypto Fraud Epidemic Victims of cryptocurrency fraud have already lost over £146m ($200m) so far this year, a double-digit increase over 2020 figures, according to…

Ransomware Operators Found Using New “Franchise” Business Model

Trend Micro – Trend Micro – Shared infrastructure  To date, we have found fifteen onion addresses used by at least four different servers, and three others still unknown. Onion Address…

CISA outlines cyberthreats targeting US water and wastewater systems

In a new advisory, CISA has warned US water and wastewater system operators about an array of cyberthreats aimed at disrupting their operations. Cybersecurity company Dragos worked with CISA, the…

ACSC offers optional DNS protection to government entities

Image: Getty Images/iStockphoto The Australian Cyber Security Centre will be offering its Australian Protective Domain Name Service (AUPDNS) for free to other government entities at federal and state level across…

Best Android VPN 2021: Our top four

Photo by Daniel Romero on Unsplash One of the things most interesting about the Android OS is the wide variety of devices it’s available in. Sure, there are Android phones…

Red Team tutorial: A walkthrough on memory injection techniques

Infosec Institute –  Infosec Institute –  There are many techniques within the memory injection field. Some are often found in malware or used by security experts to run their material,…

The King is Dead, Long Live MyKings! (Part 1 of 2)

Avast –  Avast –  MyKings is a long-standing and relentless botnet which has been active from at least 2016. Since then it has spread and extended its infrastructure so much…

US Shutters Psychic Mass Mail Fraud

US Shutters Psychic Mass Mail Fraud An international psychic mail fraud scheme that sold the promise of good fortune to tens of thousands of victims has been shut down by…

Let’s Cook ‘Compliance as Code’ with Chef InSpec

Introduction The concept of DevSecOps has introduced an array of changes to our traditional operations. One of the major changes was to move away from using tools, to learning to…