#DTX2022: How to Scam Someone Using Social Media Phishing
Jake Moore, global cybersecurity advisor at ESET, shared at DTX Europe 2022 how he used a fake social media profile to hack employees of a company
Cyber News, Cyber Threat TrendsJake Moore, global cybersecurity advisor at ESET, shared at DTX Europe 2022 how he used a fake social media profile to hack employees of a company
Cyber News, Cyber Threat TrendsThe problems cybersecurity startups attempt to solve are often a bit ahead of the mainstream. They can move faster than most established companies to fill gaps or emerging needs. Startups can often innovative faster because they are unfettered by an installed base. The downside, of course, is that startups often lack resources and maturity. It’s […]
Cyber News, Cyber Threat TrendsConsultancy firm Booz Allen has published a comprehensive report on Chinese-sponsored threat
Cyber News, Cyber Threat TrendsConsumers should protect themselves by using least-privilege principles
Cyber News, Cyber Threat TrendsWeb infrastructure and security company Cloudflare disclosed this week that it halted a 2.5 Tbps distributed denial-of-service (DDoS) attack launched by a Mirai botnet. Characterizing it as a “multi-vector attack consisting of UDP and TCP floods,” researcher Omer Yoachimik said the DDoS attack targeted the Minecraft server Wynncraft in Q3 2022. “The entire 2.5 Tbps […]
Cyber News, Cyber Threat TrendsBoffins at the University of Glasgow, in Scotland, have developed a system which they claim demonstrates a new type of cybersecurity threat: a “thermal attack.” According to the researchers, the falling price of heat-detecting thermal imaging cameras and advances in machine learning have made it more feasible to guess what passwords a target may have […]
Cyber News, Cyber Threat TrendsWhile we’re enjoying the fruits of digital life—our eBooks, movies, email accounts, social media profiles, eBay stores, photos, online games, and more—there will come a time we should ask ourselves, What happens to all of this good stuff when I die? Like anything else we own, those things can be passed along through our estates […]
Cyber News, Cyber Threat TrendsACM.79 When a process leaves sensitive data accessible to users or malware and what you can do about it. This is a continuation of my series on Automating Cybersecurity Metrics. In the last post we created some SSH credentials for a user but the credentials ended up in a files in the home directory on our […]
Cyber News, Cyber Threat TrendsBudworm leveraged the Log4j vulnerabilities to compromise the Apache Tomcat service on servers
Cyber News, Cyber Threat Trends