Get paid to scroll TikTok? The data trade behind Freecash ads
Loyal readers and other privacy-conscious people will be familiar with the expression, “If it’s too good to be true, it’s probably false.” Getting paid handsomely…
Loyal readers and other privacy-conscious people will be familiar with the expression, “If it’s too good to be true, it’s probably false.” Getting paid handsomely…
An international effort to create voluntary standards for the commercial cyber intrusion industry is wrestling with questions like who they should apply to, how to…
The defense mechanisms that NPM introduced after the ‘Shai-Hulud’ supply-chain attacks have weaknesses that allow threat actors to bypass them via Git dependencies. Collectively called PackageGate, the…
A sophisticated phishing campaign active between November 2025 and January 2026 has been exploiting Vercel’s legitimate hosting platform to distribute remote access tools to unsuspecting…
Clearly, it’s important to cast a wide net when estimating the costs of cybercrime, notes a Barracuda blog post by Tony Burgess, a twenty-year veteran of the…
This week on the Lock and Code podcast… When you hear the words “data privacy,” what do you first imagine? Maybe you picture going into…
An out-of-band (OOB) cumulative update, KB5078127, to address critical file system compatibility issues affecting Windows 11 users. The update resolves widespread problems introduced by the…
As users continue to assess the Under Armour data breach, WorldLeaks, the rebranded version of the Hunters International ransomware group, is claiming to have breached…
Federal departments and agencies are set to benefit from a whole-of-government learning technology ecosystem, after 37 agencies came together on draft “user, business and system…
Energy sector targeted in multi-stage phishing and BEC campaign using SharePoint Pierluigi Paganini January 26, 2026 Microsoft warns of a multi-stage phishing and BEC campaign…
North Korea’s Lazarus Group has launched a sophisticated supply chain attack targeting software developers through a campaign called “Fake Font.” The threat actors are using…
Suspected Russian cyber attackers tried to take down parts of Poland’s energy infrastructure with new data-wiping malware – and failed. According to information shared by…