What Is Conti Ransomware?

Conti ransomware is an extremely damaging malicious actor due to the speed with which encrypts data and spreads to other systems. The cyber-crime action is thought to be led by…

Microsoft Teams: Now your video calls support end-to-end encryption

Microsoft has rolled out a public preview of E2EE for one-to-one Teams calls, bringing its enterprise platform up to par with Facebook’s consumer apps, WhatsApp and Messenger.  Microsoft announced the…

US rolls out new rules governing export of hacking, cyberdefense tools

The US Commerce Department has released new rules designed to stop companies from selling hacking tools to China, Russia and other countries that may use them for nefarious purposes. The…

Why is Cybersecurity Failing Against Ransomware?

Hardly a week goes by without another major company falling victim to a ransomware attack. Nate Warfield, CTO at Prevailion, discusses the immense challenges in changing that status quo. Yes,…

The United States Government Will Ban the Reselling of Potentially Hacking Tools to Authoritarian Regimes

The Bureau of Industry and Security (BIS) supports the US national security, foreign policy, and economic objectives by maintaining an effective export control and treaty compliance system and encouraging continuing…

Gartner predicts privacy law changes, consolidation of cybersecurity services and ransomware laws for next 4 years

Gartner analysts released their list of cybersecurity and privacy predictions for the next few years, floating a number of potential ideas about how the world will respond to certain problems…

Vulnerability Patched in Sassy Social Share Plugin

WordFence –  WordFence –  Note: To receive disclosures like this in your inbox the moment they’re published, you can subscribe to our WordPress Security Mailing List. In 2010, Steffan Esser…

Chinese VPN app Quickfox caught exposing 1 million users’ data

The Quickfox VPN is mainly used by Chinese citizens living abroad who need to access Chinese websites as most of these sites are geo-restricted. Wizcase’s team of ethical researchers, led…

Red teaming tutorial: Active directory pentesting approach and tools

Infosec Institute –  Infosec Institute –  There are a number of tools you should use when it comes to active directory (AD). Inveigh and responder as a start point Many…

A China-aligned espionage group is targeting global telecoms, sweeping up call data dating back years

Written by AJ Vicens Oct 19, 2021 | CYBERSCOOP An advanced network of digital spies with a nexus to Chinese interests has successfully compromised parts of the global telecommunications network,…