Eight Charged with $30m Unemployment Benefits Fraud
Defendants allegedly used insider to obtain personal information
Cyber News, Cyber Threat TrendsDefendants allegedly used insider to obtain personal information
Cyber News, Cyber Threat TrendsIncident is second this year, although company says passwords are safe
Cyber News, Cyber Threat TrendsWhy deleting your Twitter account may be a very bad idea, how the police unravelled the iSpoof fraud gang, and a trip into outer space (or at least interplanetary file systems). All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and […]
Cyber News, Cyber Threat TrendsAs of September 2022, Twitter had challenged 11.72 million accounts, suspended 11,230 accounts, and removed over 97,674 pieces of misleading content related to COVID-19 worldwide. Today? It’s not doing anything. As an update on the company’s COVID-19 misinformation report webpage notes: Effective November 23, 2022, Twitter is no longer enforcing the COVID-19 misleading information policy. […]
Cyber News, Cyber Threat TrendsCloud security vendor Fortanix has updated its Data Security Manager to incorporate support for AWS’ external encryption key store system, adding another major public cloud vendor to the list of those supported for the company’s key management system. With this week’s update, Fortanix, which already supports this type of cloud key management system in Azure […]
Cyber News, Cyber Threat TrendsAmazon Web Services has announced AWS Lambda serverless function support for its automated vulnerability management service, Amazon Inspector, and a new automated sensitive data discovery capability in its machine learning security and privacy service, Amazon Macie. Both announcements were made during the AWS Re:Invent 2022 conference in Las Vegas this week. They follow other security-focused […]
Cyber News, Cyber Threat TrendsThe North Korea-linked ScarCruft group has been attributed to a previously undocumented backdoor called Dolphin that the threat actor has used against targets located in its southern counterpart. “The backdoor […] has a wide range of spying capabilities, including monitoring drives and portable devices and exfiltrating files of interest, keylogging and taking screenshots, and stealing
Cyber News, Cyber Threat Trends87% of DoD contractors are failing to meet the basic level of compliance ahead of CMMC coming into force next year
Cyber News, Cyber Threat TrendsIt’s not just the hashing, by the way. It’s the salting and the stretching, too!
Cyber News, Cyber Threat Trends