Browsing Category
Cybersecurity
#DEFCON: How US Teen Rickrolled His High School District
A time honored tradition in many US high schools is for students in their final year to do some kind of prank as part of their…
Securing Your Organization During Global Turmoil
Repelling Cyber Criminals Trying to Capitalize on a Crisis
By Kevin Orr, President, RSA Federal
Current geopolitical crises…
Hybrid Vishing Attacks Soar 625% in Q2
Detections of multi-stage phishing attacks known as “hybrid vishing” grew by over 600% from Q1 to Q2 2022, as fraudsters sought…
Microsoft Disrupts Russian Cyber-Espionage Group Seaborgium
Microsoft claims to have disrupted a prolific Russian state-backed threat group known for conducting long-running cyber-espionage…
Water Company Says Supply Safe After Ransom Group Claims
A UK water company has sought to reassure the public that their supply is still safe after reports that its attackers had claimed…
Software Patches Flaw on macOS Could Let Hackers Bypass All Security Levels
An injection flaw connected to how macOS handles software updates on the system could allow attackers to access all files on Mac…
Luckymouse Uses Compromised MiMi Chat App to Target Windows and Linux…
The threat actor Luckymouse (also known as Emissary Panda, APT27, Bronze Union and Iron Tiger) used a trojanized version of the…
Dutch Authorities Arrest Tornado Cash Developer Following U.S. Sanctions on…
The Dutch Fiscal Information and Investigation Service (FIOD) said it arrested a 29-year-old man in Amsterdam on August 10 in…
Safeguarding Industrial Control Systems Environments
Preventing internal & external cybersecurity breaches with zero trust OT network segmentation
By Ryan Lung, Senior…
#DEFCON: How Sanctions Impact Internet Operators
When governments around the world began to impose sanctions against Russia in early 2022 after the invasion of Ukraine, there were…