A history of ransomware: How did it get this far?
Today’s ransomware is the scourge of many organizations. But where did it start? If we define ransomware as malware that encrypts files to extort the…
Today’s ransomware is the scourge of many organizations. But where did it start? If we define ransomware as malware that encrypts files to extort the…
An investigation by Microsoft has finally revealed how China-based hackers circumvented its “highly isolated and restricted production environment” in May 2023. An investigation by Microsoft…
A attack that uses a database as an entry point to a network reminds us that you should never expose your databases to the Internet.…
We take a look at reports of an IoT chastity cage device which is exposing user data. A security breach or piece of inadvertent exposure…
We take a look at plans to voluntarily upload identification to X, the site formerly known as Twitter. Users of X (formerly Twitter) paying for…
While malvertising delivering infostealers has largely been a Windows problem, Mac users are getting targeted as well. Summary Malicious ads for Google searches are targeting…
Chrome browser extensions can steal passwords from the text input fields in websites, despite Chrome’s latest security and privacy standard, Manifest V3. Researchers at the…
We take a look at the importance of supply chain cybersecurity and share some tips to enhance it. By definition, a supply chain is the…
It started with a password reset email in the middle of the night. Not long ago I wrote about a recent campaign to hold LinkedIn…
We take a look at another compromise of a mobile spyware app maker, and ask whether this action comes with hidden danger. Anonymous hackers have…
The Qakbot botnet has suffered a major setback after its infrastructure was heavily disrupted by US and European law enforcement agencies. The Qakbot botnet has…
The NCSC has warned about integrating LLMs into your own services or platforms. Prompt injection and data poisoning are just some of the risks. The…