Why less is more: 10 steps to secure customer data
The Australian Cyber Security Centre has provided 10 steps for small and medium businesses to store customers’ personal data securely.
The Australian Cyber Security Centre has provided 10 steps for small and medium businesses to store customers’ personal data securely.
Compromised websites are being used to redirect to fake browser updates and deliver malware onto Mac users.
The ransomware strain known as Play is now being offered to other threat actors “as a service,” new evidence unearthed by Adlumin has revealed.
“The unusual lack of even small variations between attacks suggests that they are being carried out by affil…
A new variant of the Agent Tesla malware has been observed delivered via a lure file with the ZPAQ compression format to harvest data from several email clients and nearly 40 web browsers.
“ZPAQ is a file compression format that offers a better compres…
Clean up of over permissioned IAM accounts on GCP infra in an automated way CureIAM is an easy-to-use, reliable, and performant engine for Least Privilege Principle Enforcement on GCP cloud infra. It enables DevOps and Security team to quickly clean…
Phishing attacks are steadily becoming more sophisticated, with cybercriminals investing in new ways of deceiving victims into revealing sensitive information or installing malicious software. One of the latest trends in phishing is the use of QR codes…
The Kinsing threat actors are actively exploiting a critical security flaw in vulnerable Apache ActiveMQ servers to infect Linux systems with cryptocurrency miners and rootkits.
“Once Kinsing infects a system, it deploys a cryptocurrency mining script …
Android smartphone users in India are the target of a new malware campaign that employs social engineering lures to install fraudulent apps that are capable of harvesting sensitive data.
“Using social media platforms like WhatsApp and Telegram, attacke…
The China-linked Mustang Panda actor has been linked to a cyber attack targeting a Philippines government entity amid rising tensions between the two countries over the disputed South China Sea.
Palo Alto Networks Unit 42 attributed the adversarial col…
Ransomware group Scattered Spider aka Octo Tempest are masters at social engineering tactics like SIM swapping.