News
Culture shock: Ransomware gang sacks arts orgs' email lists
A ransomware gang has not only taken down WordFly, a mailing list provider for top arts organizations among others, but also siphoned data belonging to the US-based Smithsonian, Canada's Toronto Symphony Orchestra, and the Courtauld Institute of Art in London.…
Luca Stealer malware spreads rapidly after code handily appears on GitHub
A new info-stealer malware is spreading rapidly in the wild as the developer behind it continues to add capabilities and recently released the source code on GitHub.…
With ransomware, the road to recovery starts well before you’re attacked
Webinar Ensuring your data is protected is the first step in dealing with cyber-attacks and outages. But that's only half the job. …
Ransomware less popular this year, but malware up: SonicWall cyber threat report
SonicWall has published its latest threat report, showing a drop in ransomware but an increase in malware attacks in the first half of 2022.…
Cyber security training to fit your summer plans
Sponsored Post Keeping the world safe from cyber threats requires both passion and skills. And you can grow both with training that makes you battle-ready as soon as you leave the classroom.…
LockBit ransomware gang claims it ransacked Italy’s tax agency
The LockBit ransomware crew is claiming to have stolen 78GB of data from Italy's tax agency and is threatening to leak it if a ransom isn't paid by July 31.…
Node.js prototype pollution is bad for your app environment
Back in March, security researchers reported a critical command injection vulnerability in Parse Server, an open-source backend for Node.js environments.…
T-Mobile US to cough up $550m after info stolen on 77m customers
T-Mobile US has agreed to pay about $550 million to end legal action against it and improve its security after crooks infiltrated the self-described Un-carrier last summer and harvested personal data belonging to almost 77 million customers.…
Twitter launches probe after miscreants claims to have swiped 5.4m users' details
Twitter is investigating claims that a near-seven-month-old vulnerability in its software has been exploited to obtain the phone numbers and email addresses of a reported 5.4 million users. …
Cyber-mercenaries for hire represent shifting criminal business model
An emerging and fast-growing threat group is using a unique business model to offer cybercriminals a broad range of services that span from leaked databases and distributed denial-of-service (DDoS) attacks to hacking scripts and, in the future, potentially ransomware.…
DoJ approves Google's acquisition of Mandiant
In Brief Google's legally fraught journey to buy cybersecurity business Mandiant is in its final stretch, with the US Department of Justice closing its investigation and giving the go-ahead for the sale to proceed.…
Infosec not your job but your responsibility? How to be smarter than the average bear
Opinion The calls are coming from inside the house! Lately, Outlook users have been getting their own version of this classic urban horror myth. The email system is alerting them to suspicious activity on their accounts, and helpfully providing the IP addresses responsible.…
Realizing your software has a vulnerability is bad. Realizing you’ve shipped it to thousands of customers…
Webinar If you realized software you'd developed contained a vulnerability that left you – and your customers - open to cyber-attack what should your first priority be?…
My Big Coin founder is – you guessed it – a $6m crypto-fraudster
A crook who created a business called My Big Coin to cheat victims out of more than $6 million has been found guilty by a jury.…
Microsoft closes off two avenues of attack: Office macros, RDP brute-forcing
Microsoft is shutting the door on a couple of routes cybercriminals have used to attack users and networks.…
Don't dive head first into that crypto pool, FBI warns
The FBI has warned cryptocurrency owners and would-be owners about a scam involving phony liquidity mining that the bureau says has cost victims more than $70 million in combined losses since 2019.…
At the edge, nobody can hear your IoT devices scream …
Sponsored Feature If you've ever wondered what edge computing looks like in action, you could do worse than study the orbiting multi-dimensional challenge that is the multi-agency International Space Station (ISS).…
British intelligence recycles old argument for borking encryption: think of the children!
Comment Two notorious characters from the British security services have published a paper that once again suggests breaking end-to-end encryption would be a good thing for society. …
Russia, Iran discuss tech manufacturing, infosec and e-governance collaboration
Iran's Communications Ministry joined in a pledge with Russian state-owned defence and technology conglomerate Rostec to explore future collaboration in e-government, information security, and other areas.…
Ex-Coinbase manager charged in first-ever crypto insider trading case
A now-former Coinbase manager, his brother, and a friend were today charged with wire fraud conspiracy and wire fraud in connection with the first-ever cryptocurrency insider trading scheme in the US.…
Pages
