Month: November 2024
A new set of 15 SpyLoan apps with over 8 million installs was discovered on Google Play, targeting primarily users from South America, Southeast Asia, and Africa. The apps were discovered by McAfee, a member of the ‘App Defense Alliance,’ and have now been removed from Android’s official app store. However, their presence on Google…
Read MoreA new phishing-as-a-service (PhaaS) platform named ‘Rockstar 2FA’ has emerged, facilitating large-scale adversary-in-the-middle (AiTM) attacks to steal Microsoft 365 credentials. Like other AiTM platforms, Rockstar 2FA enables attackers to bypass multifactor authentication (MFA) protections on targeted accounts by intercepting valid session cookies. These attacks work by directing victims to a fake login page that mimics…
Read MoreRussian law enforcement has arrested and indicted notorious ransomware affiliate Mikhail Pavlovich Matveev (also known as Wazawaka, Uhodiransomwar, m1x, and Boriselcin) for developing malware and his involvement in several hacking groups. While the prosecutor’s office has yet to release any details on the individual’s identity (described as a “programmer” in court documents), the individual is…
Read MoreBologna Football Club 1909 has confirmed it suffered a ransomware attack after its stolen data was leaked online by the RansomHub extortion group. The Italian football team warns not to download or disseminate any of the stolen data, claiming it is a “serious criminal offense.” “Bologna FC 1909 S.p.a. would like to communicate that a ransomware cyber…
Read MoreFree unofficial security patches have been released through the 0patch platform to address a zero-day vulnerability introduced over two years ago in the Windows Mark of the Web (MotW) security mechanism. Windows automatically adds Mark of the Web (MotW) flags to all documents and executables downloaded from untrusted sources. These MotW labels inform the Windows…
Read MoreIn this special edition, we’ve selected the most-read Cybersecurity Snapshot items about AI security this year. ICYMI the first time around, check out this roundup of data points, tips and trends about secure AI deployment; shadow AI; AI threat detection; AI risks; AI governance; AI cybersecurity uses — and more. ICYMI, here are six things…
Read MoreIntroduction to Ransomware Containment Are you ready to prevent your ransomware attack from ruining your business? Over the past few years, ransomware has become more sophisticated and more frequent, and is now one of the most serious cybersecurity threats of our time. Ransomware protection is no longer enough, you need to be able to contain…
Read MoreThe Tor Project has put out an urgent call to the privacy community asking volunteers to help deploy 200 new WebTunnel bridges by the end of the year to fight government censorship. Currently, the Tor Project operates 143 WebTunnel bridges, which help users in heavily censored regions bypass internet access restrictions and website blocks. This…
Read MoreIn an era where data security is a growing concern, businesses must show that they are committed to protecting customer information. One way companies can demonstrate this commitment is by obtaining a SOC report. This type of report provides an assessment of a company’s controls, ensuring that they align with industry standards. But what is…
Read MoreAffordable and Effective: Best EDR Solutions for Small Business Affordable and Effective: Best EDR Solutions for Small Business
- by nlqip
Cybersecurity is no longer just a concern for large corporations. Small businesses are increasingly at risk of cyberattacks, which makes finding the right endpoint detection and response (EDR) solutions more important than ever. EDR solutions offer real-time monitoring, detection, and response capabilities to protect business devices and data from threats. However, with many options on…
Read MoreRecent Posts
- CEO Antonio Neri On HPE’s Supercomputing Advantage Over AWS, ‘Huge’ VM Essentials Opportunity And “Super Strong’ Results
- Cybersecurity Snapshot: Study Raises Open Source Security Red Flags, as Cyber Agencies Offer Prevention Tips Against Telecom Spying Attacks
- Servers, Racks And RAG: Dell Technologies’ Five Big AI Advances
- [R1] Security Center Version 6.5.0 Fixes Multiple Vulnerabilities
- The 10 Biggest Cloud Outages Of 2024