Nine State Department Phones Hijacked by Spyware

Nine State Department Phones Hijacked by Spyware Nine US State Department officials had their iPhones remotely hacked by spyware from controversial firm NSO Group, according to reports. Four people familiar…

Malvertising attack distributes malicious Chrome extensions, backdoors

Researchers believe that the campaign has been active since 2018, and since then, the malware has been under development constantly. Cisco Talos researchers have identified malvertising campaigns using fake installers…

FBI: Cuba ransomware group hit 49 critical infrastructure organizations

The FBI has released a new notice about the Cuba ransomware, explaining that the group has attacked “49 entities in five critical infrastructure sectors” and made at least $43.9 million…

Pandemic-Influenced Car Shopping: Just Use the Manufacturer API

Jason Kent, hacker-in-residence at Cequence, found a way to exploit a Toyota API to get around the hassle of car shopping in the age of supply-chain woes. The pandemic has…

NSO Group tech reportedly used to hack US officials' iPhones

Written by AJ Vicens Dec 3, 2021 | CYBERSCOOP Nearly a dozen iPhones associated with U.S. State Department employees were hacked using spyware developed by Israel-based NSO Group, Reuters first…

Compromise assessment or threat hunting? What do organizations need?

Organizations worldwide are undergoing rapid digitization to keep up with the fast-paced world we live in today. While it is a good initiative, cloud computing and remote work setup have…

What Is Privilege Escalation? Definition, Types and Examples

Privilege escalation might be a confusing cybersecurity term for many. That’s why in this article we’re going to shed a little bit more light on this topic. Keep reading to…

There's been a big jump in crooks selling access to hacked networks. Ransomware gangs are their best customers

There’s been a surge in cyber criminals selling access to compromised corporate networks as hackers look to cash in on the demand for vulnerable networks from gangs looking to initiate ransomware…

Double Extortion Ransomware: The New Normal

With more and more businesses learning how to avoid paying huge amounts of money to ransomware actors by maintaining up-to-date backups and having disaster recovery plans in place, the number…

Federal government refreshes digital transformation strategy and expands cyber hub trial

The federal government has released an updated digital government strategy as part of its goal to make Australia one of the top three digital governments in the world by 2025. …