ScarCruft APT Mounts Desktop/Mobile Double-Pronged Spy Attacks

The North Korea-linked group is deploying the Chinotto spyware backdoor against dissidents, journalists and other politically relevant individuals in South Korea. The North Korea-linked ScarCruft advanced persistent threat (APT) group…

How To Secure Your Broadband?

Having an internet connection is very crucial whether you are using your desktop, phone, or smart TV. But if you are planning on availing of internet connectivity at a fixed…

Over 300,000 Android users have downloaded these banking trojan malware apps, say security researchers

Over 300,000 Android smartphone users have downloaded what have turned out to be banking trojans after falling victim to malware which has bypassed detection by the Google Play app store. …

Remote access tools abused to spread malware and steal cryptocurrency

The new campaign also involves replacing cryptocurrency addresses shared via clipboard and setting up fake cryptocurrency websites. Trend Micro researchers have shared details of a new campaign distributing SpyAgent malware…

Here's the perfect gift for anyone with a PC, Mac, iPhone, or Android, and it doesn't break the bank

This is that time of year when people are busy looking for gifts for friends and family. Socks. After shave. Chocolates. How about giving someone a gift that will keep…

Most Brazilian remote workers feel responsible for corporate data security

Most Brazilian professionals working remotely believe they are responsible for the integrity and security of corporate data, according to a global study on consumer security attitudes. The 2021 Unisys Security…

How to build a proactive incident response plan

Organizations have long since relied on a reactive approach to cybersecurity. However, with the ever-increasing sophistication of tools for malicious actors, a reactive approach may lead to disaster. A single…

How to identify (and avoid) security threats while shopping online

Although you want to grab the best deals this holiday weekend, remember that this is the perfect time for scammers to take advantage of you online. Phishing emails — claiming…

We Might Be Seeing Some New Scams This Black Friday

On this Black Friday, you might get more than just some great deals as fraudsters are polishing their malware droppers, phishing lures, and bogus sites. A thorough study outlining the most frequent…

Google: Half of compromised cloud instances have weak or no passwords

Online criminals are deploying cryptocurrency miners within just 22 seconds of compromising misconfigured cloud instances running on Google Cloud Platform (GCP). Cryptocurrency mining is by far the main malicious activity…