Business Email Compromise attack imitates vendors, targets supply chains
We take a look at a smart social engineering ploy being used in Vendor Email Compromise attacks. Today we have a fascinating tale of a…
We take a look at a smart social engineering ploy being used in Vendor Email Compromise attacks. Today we have a fascinating tale of a…
Our Threat Intelligence team looks at known ransomware attacks by gang, country, and industry sector in December 2022, and looks at why LockBit had to…
Are you smarter than a five-year-old? When it comes to online security and privacy, you should be. Everything we teach our kids starts at home—we…
Many have been calling attention to supply chain attacks for years. Is your business ready to listen? Threat actors know that attacking the supply chain…
We take a look at JD Sports revealing a breach which took place between 2018 and 2020, and how this could impact those affected. We’re…
After an unauthorized access incident, GitHub will revoke three certificates which will affect users of Atom and GitHub Desktop for Mac. In a call to…
CERT-UA says the Russian Sandworm group deployed data wipers against Ukrinform, Ukraine’s national news agency. As war in Ukraine rages, new destructive malware continues to…
Our reserachers found a more direct way to go after your password by using Google sponsored ads campaigns We have recently written about malvertising campaigns…
An investigation into 399 web shops by the European Commission and its partners found almost 40% of them using one of three “dark patterns”. The…
This week on Lock and Code, we speak with MIT Technology Review reporter Eileen Guo about how an image of a woman on a toilet—captured…
We take a look at reports of a WordPress plugin issue. It’s been fixed, but you may need to update! It’s time for a reminder…
The Riot Games breach saga continues. After confirming threat actors were able to steal some of its code, Riot Games has also revealed that it received a…