0 Comments
The legal industry’s first comprehensive data security evaluation and accreditation program has been launched today. The Data Steward Program (DSP), which has been developed by the Association of Corporate Counsel (ACC), will enable quick assessments and comparisons of law firms’ data security standards by prospective clients. The ACC said the program has been introduced in
0 Comments
Security researchers have discovered new malware disguised as a Netflix application, designed to spread worm-like via victims’ WhatsApp messages. Check Point discovered the wormable malware in an application on the Google Play Store called ‘FlixOnline’. It was designed to attract Android users by promising unlimited entertainment from anywhere in the world, using the Netflix logo to
0 Comments
ESET Research uncovers a new threat that targets organizations operating in various sectors in Brazil ESET Research has been tracking a new banking trojan that has been targeting corporate users in Brazil since 2019 across many verticals affecting sectors such as engineering, healthcare, retail, manufacturing, finance, transportation, and government. This new threat, which we named
0 Comments
Executive Summary  Cuba ransomware is an older ransomware, that has recently undergone some development. The actors have incorporated the leaking of victim data to increase its impact and revenue, much like we have seen recently with other major ransomware campaigns.  In our analysis, we observed that the attackers had access to the network before the infection and were able to collect specific information
0 Comments
A hacking group related to a Chinese-speaking threat actor has been linked to an advanced cyberespionage campaign targeting government and military organizations in Vietnam. The attacks have been attributed with low confidence to the advanced persistent threat (APT) called Cycldek (or Goblin Panda, Hellsing, APT 27, and Conimes), which is known for using spear-phishing techniques
0 Comments
The connection between cybersecurity and poet Ralph Waldo Emerson is not directly evident, however he once said, “money often costs too much.” This statement rings true across the financial services industry, as money is a key driver for cybercriminals acting with malicious intent. The always-on eye of Sauron on the financial services industry means there
0 Comments
American multinational technology company Microsoft has been hit by its second outage in two weeks. Striking the company on April Fool’s Day, the substantial cloud outage knocked Microsoft’s Azure cloud services, Teams, Office 365, and OneDrive offline. Skype, Xbox Live, and Bing were also impacted. News of the outage began emanating from Twitter users at around 5pm ET yesterday.
0 Comments
In what’s likely to be a goldmine for bad actors, personal information associated with approximately 533 million Facebook users worldwide has been leaked on a popular cybercrime forum for free. The leaked data includes full names, Facebook IDs, mobile numbers, locations, email addresses, gender, occupation, city, country, marital status broken, account creation date, and other
0 Comments
The MITRE ATT&CK® Framework proves that authority requires constant learning and the actionable information it contains has never held greater currency. Likewise, XDR, the category of extended detection and response applications, is quickly becoming accepted by enterprises and embraced by Gartner analysts, because they “improve security operations productivity and enhance detection and response capabilities.”   It is less well known how these tools align
0 Comments
A cyber-bully has been fined for sending hateful messages to a professional wrestler before she took her own life. Japanese wrestler and Netflix reality show star Hana Kimura was just 22 years old when she killed herself on May 23 last year by inhaling toxic gas in her Tokyo home. Kimura became a target for internet trolls
0 Comments
Myth-busting Antivirus Assumptions The number of new viruses grows every day. In fact, McAfee recently registered a 605% increase in total Q2 COVID-19 themed threat detections, contributing to the millions already in existence. While there is no way to know when or how cyberattacks will occur, it’s clear that antivirus software is one of the best ways
0 Comments
A former intelligence analyst who was once a United States military service member has pleaded guilty to obtaining classified information and passing it to a reporter. Daniel Everette Hale served as an enlisted airman in the US Air Force from July 2009 to July 2013. After language and intelligence training, the 31-year-old from Nashville, Tennessee,
0 Comments
Many enterprises rely on more than one security tool to protect their technology assets, devices, and networks. This is particularly true for organizations that use hybrid systems or a combination of cloud and local applications. Likewise, companies whose networks include a multitude of smartphones and IoT devices are likely to deploy multiple security solutions suitable
0 Comments
Does every device in your home really need to be connected to the internet? And could your smart appliance be turned against you? If you try to purchase a new appliance these days, there is a good chance you will be guided toward the most up-to-date, state-of-the-art, smart appliances first. Whether you are in the
0 Comments
The U.S. Department of Justice (DoJ) on Wednesday said that an Israeli national pleaded guilty for his role as an “administrator” of a portal called DeepDotWeb (DDW), a “news” website that “served as a gateway to numerous dark web marketplaces.” According to the unsealed court documents, Tal Prihar, 37, an Israeli citizen residing in Brazil,