October 14, 2022 There are many reasons to report a successful cyber attack to your local police force. Arguably, Det. Const. Doug MacRae of the cybercrime section of Ontario’s York Regional Police has the best: “Your tax dollars more...
October 14, 2022 The alert from the head of IT is alarming: There’s been a breach of security controls. The incident recovery (IR) plan kicks in – you do have one, right? – and the IR team will more...
October 14, 2022 The Emotet botnet has improved, phony Google Translate pages used for phishing, fake COVID scams in the US continue, and more Welcome to Cyber Security Today. It’s Friday, October 14th, 2022. I’m Howard Solomon, contributing more...
October 14, 2022 Magniber ransomware is targeting Windows home users via fake security updates promoted on malicious websites. The security update contains a malicious file that contains JavaScript, which can trigger a complicated infection with the file-encrypting malware. more...
October 14, 2022 A Fortinet vulnerability in FortiGate firewalls and FortiProxy web proxies could allow a threat actor to perform unauthorized actions on vulnerable devices. Fortinet has issued security updates to fix the vulnerability and has urged customers more...
October 14, 2022 Fast Company, an American business magazine, has confirmed that the personal information of its board members was not stolen in a cyberattack that forced the company to shut down its website. However, the company said more...
October 13, 2022 Intel has confirmed the Alder Lake BIOS source leak as genuine. A 6GB file containing tools and code for creating and optimizing BIOS/UEFI images is included in the leaked source code. In the BIOS/UEFI of more...
October 13, 2022 Aqua security experts have uncovered a npm timing attack that reveals the names of private packages and allows attackers to trick developers into using malicious clones. A timing attack is a vulnerability that allows an more...
October 12, 2022 Trend Micro researchers have uncovered the malware toolset of the Chinese cyber espionage group Earth Aughisky, known for compromising legitimate accounts, software, applications and other weaknesses in network design and infrastructure. The gang uses spear more...
October 12, 2022 The operators of the BazarCall call back phishing attacks are upgrading the social engineering tactics used to deploy malware in victim networks. According to cybersecurity firm Trelix, the program serves as an entry point for more...