July 20, 2022 With law enforcement and intelligence agencies in many countries hunting ransomware gangs, it’s no surprise some veteran groups are reportedly disbanding, laying low, or abandoning their brands and starting with new names. Yet despite this more...
July 20, 2022 Several companies, including (ISC)², Cisco and Fortinet, have vowed to train millions of people to address the lack of cybersecurity experts. The decision was announced during the White House National Cyber Workforce and Education Summit more...
July 20, 2022 An anonymous service that can get you hacked, infected online restaurant platforms found, a Mac backdoor discovered, and more. Welcome to Cyber Security Today. It’s Wednesday July 20th, 2022. I’m Howard Solomon, contributing reporter on more...
July 20, 2022 An anonymous service that can get you hacked, infected online restaurant platforms found, a Mac backdoor discovered, and more. Welcome to Cyber Security Today. It’s Wednesday July 20th, 2022. I’m Howard Solomon, contributing reporter on more...
July 20, 2022 An anonymous service that can get you hacked, infected online restaurant platforms found, a Mac backdoor discovered, and more. Welcome to Cyber Security Today. It’s Wednesday July 20th, 2022. I’m Howard Solomon, contributing reporter on more...
July 19, 2022 A large phishing campaign is focusing on organizations using Microsoft Office 365, tricking victims into logging into a spoofed Office online authentication page to steal their credentials and ultimately conduct business email compromise (BEC) scams. more...
July 19, 2022 The FBI is warning people in the United States to be vigilant as cyber criminals are using fraudulent cryptocurrency investment applications to steal funds from U.S. investors. The agency identified the threat actors operating under more...
July 19, 2022 Security researchers at Checkmarx have uncovered a software supply chain attack technique that tricks developers into downloading malicious code on GitHub. Threat actors can carry out their nefarious activities by spoofing and forging data on more...
July 18, 2022 Security researchers at Dragos have uncovered the activities of a threat actor that uses password recovery tools to infect industrial control systems (ICS). After analyzing an incident involving Automation Direct's DirectLogic PLCs, the researchers discovered more...
July 18, 2022 Unknown to many, deleting files on their devices does not mean that these files cannot be recovered. According to security researchers, data does not disappear when users delete a piece of data from their device. more...