April 6, 2022
Via: FCWThe chairman of a congressional subcommittee has asked Apple and Google to help stop fraud against U.S. taxpayers on Telegram, a fast-growing messaging service distributed via their smartphone app stores. The request from the head of the House Select Subcommittee […]
February 18, 2022
Via: Dark ReadingOver the years, Russia and an ecosystem of Russian-language speakers have been at the heart of all types of cyberattacks, nation-state attacks, and cyber warfare. It is a criminal underground that is constantly evolving and shifting. “Many associated actors were […]
November 3, 2021
Via: ZDnetResearch into how rootkits are used by cybercriminals has revealed that close to half of campaigns are focused on compromising government systems. On Wednesday, Positive Technologies released a report on the evolution and application of rootkits in cyberattacks, noting that […]
June 30, 2021
Via: Dark ReadingToday’s chief information security officer (CISO) is often judged by how well the organization adheres to compliance regulations. But when organizations focus solely on compliance, they are missing important cybersecurity practices and are essentially handing their security playbooks to attackers. […]
February 2, 2021
Via: Threat PostCases of identity theft in the United States doubled in 2020, mainly due to cybercriminals taking advantage of people affected economically by COVID-19 who filed to receive government benefits. This is according to the Federal Trade Commission (FTC), which received […]
October 28, 2020
Via: Threat PostThe line between our personal and professional lives is blurring in an unprecedented fashion as we approach the 2020 presidential election. From Oracle and Walmart’s plans to invest in TikTok to a bug in Joe Biden’s campaign app that exposed […]
October 21, 2020
Via: Threat PostWith the U.S. presidential elections a mere few weeks away, the security industry is hyper-aware of security vulnerabilities in election infrastructure, cyberattacks against campaign staffers and ongoing disinformation campaigns. Past direct hacking efforts, such as the attack on the Democratic […]
September 20, 2017
Via: ZDnetWith the prevalence of successful ransomware attacks, you might think that all cyber criminals view the rise of file-encrypting malware as a positive development. For many, making cash quickly with the minimal amount of effort is their number one priority […]