Browsing Category
Cybersecurity
What Makes A USB Bad – And How Should Organizations Resolve This…
When ransomware can attack organizations via USB drives and cables, best practice backup and security becomes even more…
LockBit Ransomware Exploits Windows Defender to Sideload Cobalt Strike…
A Sentinel One investigation revealed threat actors (TA) have been abusing the Windows Defender command line tool to decrypt and…
Google Patches Critical Android Bluetooth Flaw in August Security Bulletin
Google published its monthly security bulletin for August on Monday, detailing the latest available patches for Android.
A total…
Dark Web Research Suggests 87% of Ransomware brands Exploit Malicious…
Machine identity management firm Venafi has published new research suggesting that 87% of the ransomware found on the dark web has…
US Indicts Russian Accused of Promoting California’s Secession
The US authorities have indicted a Russian national for allegedly orchestrating a Kremlin-backed “malign influence campaign”…
Thousands of Apps Leaking Twitter API Keys
Security researchers have discovered over 3200 mobile apps which are leaking Twitter API keys, potentially enabling threat actors…
UK’s Top 10 Universities Failing on DMARC
The UK’s top 10 universities and most of the leading educational institutions in the US and Australia are failing to protect their…
Credential Stealer Malware Raccoon Updated to Obtain Passwords More…
Security experts from online platform Zscaler have published an analysis of the new variant of the known Raccoon Stealer malware.…
North Korean Hackers Use Browser Extension to Spy on Gmail and AOL Accounts
Cybersecurity firm Volexity spotted new activity from a threat actor (TA) allegedly associated with North Korea and deploying…
Austrian Investigation Reveals Spyware Targeting Law Firms, Finance…
The Austrian government said on Friday it was investigating a company based within the nation’s territory for allegedly developing…