June 30, 2022
Via: Security WeekNorwegian Prime Minister Jonas Gahr Støre said that to his knowledge the attack “has not caused any significant damage.” The distributed-denial-of-service (DDOS) attack targeted a secure national data network forcing the temporary suspension of online services for several hours, the […]
December 22, 2021
Via: Security IntelligenceCyberwarfare is not a future threat—it’s a clear and present danger. While the concept of cyber terrorism might sound like something from a fictional movie, our interconnected world is riddled with security flaws that make it an unfortunate reality. Digital […]
Threats & Malware, Vulnerabilities
April 28, 2021
Via: Computer WeeklyDespite more than 70% of banks and insurers having experienced a 32% rise in cyber crime during the Covid-19 pandemic, financial institutions (FIs) have slashed their IT security, cyber crime, fraud and risk department budgets by 27% in the past […]
March 2, 2021
Via: Dark ReadingIdentities have become the primary attack surface in the cloud. However, they remain largely unprotected because traditional security tools were designed to protect the network perimeter, not user and service accounts. Gartner predicts that by 2023, 75% of cloud security […]
July 30, 2020
Via: CSO OnlinePayment cards make purchasing convenient not only for consumers and businesses, but for fraudsters, too. Global fraud losses from payment cards in 2018 reached $27.85 billion, according to the latest numbers from The Nilson Report, a card and mobile payments […]
June 26, 2020
Via: Computer WeeklyThreat researchers at Check Point say they have observed a dramatic decrease in malicious Covid-19 coronavirus domains in Europe and North America as national lockdown measures begin to ease, but the danger is by no means past. New data released […]
Cyber-crime, Hacker, Phishing, Threats & Malware
February 27, 2020
Via: CSO OnlineCyber attack definition Simply put, a cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Cyber attacks can be broken down into two broad types: attacks where the goal is to […]
February 24, 2020
Via: Lawrence MaloneA new decade fresh with opportunity is upon us, along with new opportunities for cybercriminals to prove their skills. Cybersecurity threats have become increasingly ingenious over the last couple of years. To think that it all started out as “phone […]
February 4, 2020
Via: Computer WeeklyA secure cyber space is crucial for the basic functioning of the economic, political and social structures of present-day society. In order to achieve a free, open, secure and interoperable cyber space that takes into account human rights compliance and […]
January 14, 2020
Via: Computer WeeklyHackers spent an average of 95 days moving around inside business networks before launching their attacks in 2019, up 10 days on 2018, as increasingly organised criminal groups become adept at hiding their activities from defenders in targeted attacks. This […]
December 23, 2019
Via: CSO OnlineOnce again, the holiday season is upon us! For me, this time of year means spending quality time with my family and friends. It represents a time for joy and kindness towards others. Unfortunately, not everyone shares this sentiment. During […]
June 29, 2018
Via: Security AffairsThe development team of the Gentoo Linux distribution notifies users that hackers compromised one of the GitHub accounts and planted a malicious code. Developers of the Gentoo Linux distribution announced that hackers compromised one of the GitHub accounts used by […]
Cyber-crime, Hacker, Malware, Threats & Malware
December 21, 2017
Via: Hot for SecurityAs part of an extensive law enforcement operation called “Bakovia,” Romanian authorities on Wednesday arrested five individuals suspected of infecting tens of thousands of computers across Europe and the United States using the infamous Ransomware-as-a-Service model leveraging two of the […]
December 6, 2017
Via: CSO OnlineBotnets act as a force multiplier for individual attackers, cyber-criminal groups, and nation-states looking to disrupt or break into their targets’ systems. By definition, they are a collection of any type of internet-connected device that an attacker has compromised. Commonly […]
September 8, 2017
Via: Help Net SecurityOne in four companies have already experienced a ransomware attack and one in eight have dealt with an IoT-based attack, according to Arctic Wolf Networks. As mid-market companies continue to embrace IoT without implementing the necessary security tools, these attacks […]
September 7, 2017
Via: Help Net SecurityThe Dragonfly hacking group is back – or should we say it probably never went away – and is still interested in penetrating the networks of European and US companies in the energy sector. Even worse, their efforts have been […]
September 6, 2017
Via: Hot for SecurityContinuing its crackdown on Virtual Private Network applications that allow users to bypass regulated communication channels, the Chinese Supreme Court setenced a man to nine months in prison for selling VPN software. Deng Jiewei, 26, was found guilty of “illegal […]
Cyber-crime, Privacy protection
September 4, 2017
Via: We Live SecuritySecurity researchers at ESET have released new research today into the activities of the notorious Turla cyberespionage group, and specifically a previously undocumented backdoor that has been used to spy on consulates and embassies worldwide. ESET’s research team are the […]
September 4, 2017
Via: We Live SecurityA spambot has leaked more than 700 million email addresses and passwords publicly in a huge data breach. The data dump occurred thanks to a misconfigured spambot, dubbed ‘Onliner’, and was discovered by a Paris-based security researcher known as Benkow. […]
September 4, 2017
Via: We Live SecurityGoogle has been forced to remove almost 300 apps from its Play Store after learning that apps were being hijacked for DDoS attacks, an attack that ESET warned its followers on social media about in early August. The botnet, named […]