Avast Q3’21 Threat Report

Avast –  Avast –  Latest Avast Q3’21 Threat Report reveals elevated risk for ransomware and RAT attacks, rootkits and exploit kits return. Foreword The threat landscape is a fascinating environment…

Israeli Entities Targeted by the New Politically-motivated “Moses Staff” Hacking Group

Moses Staff, a new cybercrime organization, has recently taken credit for multiple attacks targeting Israeli companies, which appear to be politically motivated since no ransom requests are made. In the…

Government Plans Regulation to Bolster Supply Chain Security

Government Plans Regulation to Bolster Supply Chain Security Government regulation could be on the way to force improvements in supply chain security after industry feedback and new research pointed to…

Cryptojackers Disable Alibaba Cloud Security Agent

Cryptojackers Disable Alibaba Cloud Security Agent Security experts have warned that threat actors are compromising Alibaba Cloud (Aliyun) infrastructure to deploy cryptocurrency mining malware. The Chinese tech giant is a popular choice…

Peloton bike, Amazon Halo Band and Facebook Portal featured on Mozilla list of holiday gifts lacking privacy features

Mozilla has released the latest edition of its *Privacy Not Included shopping guide, aiming to provide holiday buyers with a concrete list of how the most popular items handle privacy…

Bad Santa: Amazon, Facebook top Mozilla's naughty list of privacy-crushing gifts

Mozilla has released the latest edition of its *Privacy Not Included shopping guide, aiming to provide holiday buyers with a concrete list of how the most popular items handle privacy…

Cybercriminals Target Alibaba Cloud for Cryptomining, Malware

Malicious groups disable features in Alibaba Cloud ECS instances for Monero cryptojacking, according to Trend Micro researchers. Cybercriminals are targeting Alibaba Elastic Computing Service (ECS) instances, disabling certain security features…

New vulnerabilities allowed attackers to intercept Zoom meetings

Exploiting these vulnerabilities, a remote attacker could also execute arbitrary code on the server using root-user privileges. The cybersecurity researchers at Positive Technologies identified three vulnerabilities in several critical apps…

How big data analytics helps enterprises improve cybersecurity

Big data analytics can be directed to several use cases, like marketing, talent management, sales forecasting, or in this case, cybersecurity. Let’s dig into hows and whats of it. Cybersecurity…

Cisco partners with JupiterOne for cloud security platform

JupiterOne and Cisco announced an expanded cloud security and security operations partnership on Monday designed to provide businesses with a range of cybersecurity services. The Cisco Cloud Security Insights with…