Security

June 24, 2022 Canada’s telecom regulator will create a mechanism that internet service providers will have to use to block malware-carrying botnets. In a ruling released Thursday, the Canadian Radio-television and Telecommunications Commission said internet providers here will more...

June 24, 2022 Threat analysts from Secureworks have uncovered the activities of two Chinese hacking groups that use ransomware as a decoy for cyber espionage. Ransomware as a decoy allows attackers to cover their tracks, complicate attribution, and more...

June 24, 2022 According to Google, an Italian company, RCS Lab uses hacking tools to spy on Apple and Android smartphones in Italy and Kazakhstan. Google researchers also found that RCS Lab had previously worked with the controversial, more...

June 24, 2022 Unpatched VMware applications are still being exploited, ransomware used as a decoy, and a COVID text scam. Welcome to Cyber Security Today. It’s Friday, June 24th, 2022. I’m Howard Solomon, contributing reporter on cybersecurity for more...

June 23, 2022 A Canadian password management application has added a dashboard to make it easier for IT administrators to see how many employees aren’t taking advantage of the suite’s security capabilities. Toronto-based 1Password said this week the more...

June 23, 2022 Windows’ PowerShell scripting utility has been abused by threat actors for decades. But cyber intelligence agencies from the U.S, the United Kingdom, and New Zealand say disabling the capability isn’t the solution. Instead, they say more...

June 23, 2022 Researchers detected 56 vulnerabilities impacting devices from 10 operational technology (OT) vendors, most of which are attributed to inherent design flaws in equipment and a lackluster approach to security and risk management. According to the more...

June 22, 2022 Russian intelligence agencies have recently increased their IT network penetration and espionage activities against countries supporting Ukraine, including Canada, the U.S. and other members of NATO, according to a new Microsoft report. In addition, the more...

June 22, 2022 Researchers at Forescout’s Vedere Labs wanted to show how insecure many internet-connected operational technology (OT) systems can be. So on Monday they released 56 vulnerabilities discovered across products from nine manufacturers. Dubbed Icefall, the holes more...

June 22, 2022 Adobe Acrobat may block security software from having visibility into the PDF files it opens. This could pose a security risk to users as it prevents these antivirus tools from monitoring for malicious activity. The more...

Top Stories

No Ads Available to show.