Author: nlqip

Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill’s threat experts. Each story shines a light on underground activities, the threat actors involved, and why you should care, along with what you can do to mitigate risk. In an increasingly interconnected world, supply chain attacks have emerged…

Read More

Drones, some coloured cardboard, and a piece of tinfoil may be all the kit you need to crash a robot-driven taxi, and a rapper is accused of using Justin Bieber’s name to defraud a TV company. All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham…

Read More

Jun 06, 2024NewsroomEndpoint Security / Malware Threat actors are increasingly abusing legitimate and commercially available packer software such as BoxedApp to evade detection and distribute malware such as remote access trojans and information stealers. “The majority of the attributed malicious samples targeted financial institutions and government industries,” Check Point security researcher Jiri Vinopal said in…

Read More

Jun 06, 2024The Hacker NewsPassword Security / Dark Web Tom works for a reputable financial institution. He has a long, complex password that would be near-impossible to guess. He’s memorized it by heart, so he started using it for his social media accounts and on his personal devices too. Unbeknownst to Tom, one of these…

Read More

Jun 06, 2024NewsroomData Encryption / Privacy Google has announced plans to store Maps Timeline data locally on users’ devices instead of their Google account effective December 1, 2024. The changes were originally announced by the tech giant in December 2023, alongside changes to the auto-delete control when enabling Location History by setting it to three…

Read More

Jun 06, 2024NewsroomSoftware Security / Data Theft Cybersecurity researchers have discovered a malicious Python package uploaded to the Python Package Index (PyPI) repository that’s designed to deliver an information stealer called Lumma (aka LummaC2). The package in question is crytic-compilers, a typosquatted version of a legitimate library named crytic-compile. The rogue package was downloaded 441…

Read More

But that’s not what has some in the security industry concerned. Additional software called Recall will take snapshots and images and store them locally on the device so that you can review and roll back to remind yourself of what file, website, or app you were using in the past. The Recall feature introduces some…

Read More

Circana’s Mike Crosby shares insight on channel trends in the education market, including the opportunities around AI in higher education and the potential rise of device as a service. Jennifer Follett, Executive Editor, CRN: This is Jennifer Follett with CRN, and I’m here with Mike Crosby of Circana. Mike, thanks so much for joining me.…

Read More

The new Built on Workday program offers the cloud software company’s ISV and development partners the opportunity to more widely sell through the Workday marketplace the applications and add-on software they build for the Workday platform. Cloud software provider Workday has launched a program to help ISV and software development partners market and sell applications…

Read More

Researchers observed a new Linux variant of the TargetCompany ransomware family that targets VMware ESXi environments using a custom shell script to deliver and execute payloads. Also known as Mallox, FARGO, and Tohnichi, the TargetCompany ransomware operation emerged in June 2021 and has been focusing on database attacks (MySQL, Oracle, SQL Server) against organizations mostly in Taiwan, South Korea,…

Read More