Month: April 2024

The planned acquisition of 17-year-old Egress will bring together AI-driven capabilities such as anti-phishing with KnowBe4’s widely used security training platform, according to the company. KnowBe4 announced Wednesday it has reached an agreement to acquire Egress, a 17-year-old company focused on providing AI-powered email security. Terms of the acquisition were not disclosed. Egress has 318…

Read More

Scalable risk management Critical Start MDR for OT promises visibility and risk reduction at a “reasonable” cost for organizations with or without OT security tools. With its scalability support for additional monitoring tools as and when they are onboarded, the offering aims for a “future-proof” deployment. The offering, on top of operating independently, can support…

Read More

The UK’s Leicester City Council was thrown into chaos last month when a crippling cyber attack forced it to shut down its IT systems and phone lines. The INC Ransom group perpetrated the ransomware attack, which reportedly impacted care home workers and the homeless but also saw at least 1.3 terabytes of stolen data published…

Read More

Dan Solove on Privacy Regulation Law professor Dan Solove has a new article on privacy regulation. In his email to me, he writes: “I’ve been pondering privacy consent for more than a decade, and I think I finally made a breakthrough with this article.” His mini-abstract: In this Article I argue that most of the…

Read More

With this system, the raw biometric information is never accessible to any software or system outside the module, including the phone’s own operating system. On the iPhone, this is called the secure enclave and is available on every phone with an Apple A7 chip or newer. The first phone with this technology was the iPhone…

Read More

Apr 24, 2024NewsroomEncryption / Mobile Security Security vulnerabilities uncovered in cloud-based pinyin keyboard apps could be exploited to reveal users’ keystrokes to nefarious actors. The findings come from the Citizen Lab, which discovered weaknesses in eight of nine apps from vendors like Baidu, Honor, iFlytek, OPPO, Samsung, Tencent, Vivo, and Xiaomi. The only vendor whose…

Read More

By looking at the table of supported IP protocols, we see that the bot creates raw packets of IGMP, ICMP and TCP protocols. Those packets are just being marked with those protocol numbers, however other fields and headers are not actually set. The packet is filled with “A” characters according to the size specified by…

Read More

Shellshock can take advantage of HTTP headers as well as other mechanisms to enable unauthorized access to the underlying system shell, Bash. The Shellshock attack takes advantage of a flaw in Bash that enables attackers to execute remote commands that would ordinarily be blocked. It’s been rated the highest risk possible because remote command execution…

Read More

Tinba, also known as “Tinybanker”, “Zusy” and “HµNT€R$”, is a banking Trojan that was first seen in the wild around May 2012. Its source code was leaked in July 2014. Cybercriminals customized the leaked code and created an even more sophisticated piece of malware that is being used to attack a large number of popular…

Read More

  Dyre is one of the most sophisticated banking and commercial malware agents in the wild. This trojan uses fake login pages, server-side webinjects, and modular architecture to adapt to the victim. This in-depth report looks at the entire fraud flow and its capabilities. Dyre is a relatively new banking Trojan, first seen in the…

Read More