The US Consumer Financial Protection Bureau has withdrawn a proposed rule that would have restricted data brokers from selling US citizens’ personal and financial information. […]
Pen Testing for Compliance Only? It’s Time to Change Your Approach
Imagine this: Your organization completed its annual penetration test in January, earning high marks for security compliance. In February, your development team deployed a routine […]
Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper
Cybersecurity researchers have discovered a malicious package named “os-info-checker-es6” that disguises itself as an operating system information utility to stealthily drop a next-stage payload onto […]
Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers
A Russia-linked threat actor has been attributed to a cyber espionage operation targeting webmail servers such as Roundcube, Horde, MDaemon, and Zimbra via cross-site scripting […]
Hacker nehmen Rüstungslieferanten der Ukraine ins Visier
Russische Hacker greifen gezielt Rüstungsfirmen an, die die Ukraine mit Waffen versorgen. PeopleImages.com – Yuri A – Shutterstock.com Die berüchtigte russische Hackergruppe Fancy Bear hat […]
‘Aggressive, creative’ hackers behind UK breaches now eyeing US retailers
Google has warned that a hacking group linked to “Scattered Spider,” which is believed to be behind the attack on UK retailer Marks & Spencer […]
The most effective phishing QR code is a new drug and alcohol policy supposedly from HR
Phishing emails that appear to be internal and come from the IT or HR department are the emails that trick the most users, according to […]
5 BCDR Essentials for Effective Ransomware Defense
Ransomware has evolved into a deceptive, highly coordinated and dangerously sophisticated threat capable of crippling organizations of any size. Cybercriminals now exploit even legitimate IT […]
How phones get hacked: 7 common attack methods explained
The smartphone revolution was supposed to provide a second chance for the tech industry to roll out a secure computing platform. These new devices were […]
Critical BitLocker Flaw Exploited in Minutes: Bitpixie Vulnerability Proof of Concept Unveiled
Security researchers have demonstrated a non-invasive method to bypass Microsoft BitLocker encryption on Windows devices in just five minutes without physically modifying the hardware. The […]