Agenda Ransomware Switches to Rust to Attack Critical Infrastructure
Victim companies have a combined revenue of around $550m
Cyber News, Cyber Threat TrendsVictim companies have a combined revenue of around $550m
Cyber News, Cyber Threat TrendsThe company confirmed the data does not include any credit card information
Cyber News, Cyber Threat TrendsThe company confirmed the data does not include any credit card information
Cyber News, Cyber Threat TrendsSocial media analytics service Social Blade has confirmed that it is investigating a security breach, after a hacker offered its user database for sale on an underground criminal website. Read more in my article on the Hot for Security blog.
Cyber News, Cyber Threat TrendsSocial media analytics service Social Blade has confirmed that it is investigating a security breach, after a hacker offered its user database for sale on an underground criminal website. Read more in my article on the Hot for Security blog.
Cyber News, Cyber Threat TrendsThe most recent iPhone update—to version 16.1.2—patches a zero-day vulnerability that “may have been actively exploited against versions of iOS released before iOS 15.1.” News: Apple said security researchers at Google’s Threat Analysis Group, which investigates nation state-backed spyware, hacking and cyberattacks, discovered and reported the WebKit bug. WebKit bugs are often exploited when a […]
Cyber News, Cyber Threat TrendsGitHub on Thursday said it is making available its secret scanning service to all public repositories on the code hosting platform for free. “Secret scanning alerts notify you directly about leaked secrets in your code,” the company said, adding it’s expected to complete the rollout by the end of January 2023. Secret scanning is designed to examine repositories […]
Cyber News, Cyber Threat TrendsReality has a way of asserting itself, irrespective of any personal or commercial choices we make, good or bad. For example, just recently, the city services of Antwerp in Belgium were the victim of a highly disruptive cyberattack. As usual, everyone cried “foul play” and suggested that proper cybersecurity measures should have been in place. […]
Cyber News, Cyber Threat TrendsAttackers specifically craft business email compromise (BEC) and phishing emails using a combination of malicious techniques, expertly selected from an ever-evolving bag of tricks. They’ll use these techniques to impersonate a person or business that’s well-known to the targeted recipient and hide their true intentions, while attempting to avoid detection by security controls. As a […]
Cyber News, Cyber Threat Trends