Cybersecurity
-
Threat Intelligence
Microsoft to Block Excel Add-ins to Stop Office Exploits
Microsoft plans to add a feature to Office Excel that will make it harder for cyberattackers to exploit the spreadsheet…
-
Threat Intelligence
‘DragonSpark’ Malware: East Asian Cyberattackers Create an OSS Frankenstein
We imagine that the world’s most successful hackers write their own dangerous code and invest heavily in the technologies they…
-
Threat Intelligence
Pair of Galaxy App Store Bugs Offer Cyberattackers Mobile Device Access
The Galaxy App Store, the official mobile app store available on Samsung devices, has two vulnerabilities, which, if exploited, could allow…
-
Threat Intelligence
Hunting Insider Threats on the Dark Web
Insider threats are a serious and growing problem. According to recent research, malicious employees contribute to 20% of incidents and…
-
Threat Intelligence
FanDuel Sportsbook Bettors Exposed in Mailchimp Breach
The FanDuel online sportsbook has told its users to be on the lookout for phishing cyberattacks in the wake of…
-
Threat Intelligence
Ransomware Profits Decline as Victims Dig In, Refuse to Pay
In another sign that the tide may be finally turning against ransomware actors, ransom payments declined substantially in 2022 as…
-
Threat Intelligence
Attackers Crafted Custom Malware for Fortinet Zero-Day
Researchers analyzing data associated with a recently disclosed zero-day vulnerability in Fortinet’s FortiOS SSL-VPN technology have identified a sophisticated new…
-
Threat Intelligence
Cybercriminals Target Telecom Provider Networks
The growing use of mobile devices for multifactor authentication increasingly has made telecom providers a juicy target for cybercrime. An…
-
Mobile
WhatsApp can be forced to decrypt WhatsApp Google Drive backups by state surveillance
The AES-GCM-256 key is stored and generated by WhatsApp server and is sent to the client. When a user signs in to…
-
Threat Intelligence
Name That Toon: Poker Hand
New year, new cartoon contest! We’re flushed with excitement, knowing our clever, cybersecurity-minded readers are going to come up with…
- 1
- 2