Cybersecurity News


China, Iran, and Russia worked together to call out US hypocrisy on BLM protests

Report from social media research group shows foreign diplomats and state-controlled media pounced on the US' abysmal handling of the BLM protests to attack the US as a beacon of freedom and further their own political goals.
04 June 2020

New 'Tycoon' Ransomware Strain Targets Windows, Linux

Researchers say Tycoon ransomware, which has targeted software and educational institutions, has a few traits they haven't seen before.
04 June 2020

Tycoon Ransomware Banks on Unusual Image File Tactic

Tycoon Ransomware Banks on Unusual Image File Tactic To fly under the radar, the newly discovered ransomware is compiled into a Java image file format that's rarely used by developers.
04 June 2020

Trump, Biden Campaign Staffers Targeted By APT Phishing Emails

Trump, Biden Campaign Staffers Targeted By APT Phishing Emails Google TAG researchers warn that APTs are targeting campaign staffers for both Donald Trump and Joe Biden with phishing emails.
04 June 2020

Malware Campaign Hides in Resumes and Medical Leave Forms

The campaigns have been part of the overall increase in coronavirus-related malware activity.
04 June 2020

Strengthening Secure Information Sharing Through Technology & Standards

How data sharing, innovation, and regulatory standardization can make it easier for organizations to both contribute and consume critical threat intelligence.
04 June 2020

Google: Chinese and Iranian hackers targeted Biden and Trump campaign staffers

Google's TAG team said phishing attacks against Biden and Trump campaign staffers were unsuccessful.
04 June 2020

Understanding the Payload-Less Email Attacks Evading Your Security Team

Understanding the Payload-Less Email Attacks Evading Your Security Team Business email compromise (BEC) attacks represent a small percentage of email attacks, but disproportionately represent the greatest financial risk.
04 June 2020

Zoom Restricts End-to-End Encryption to Paid Users

Zoom Restricts End-to-End Encryption to Paid Users The end-to-end encryption feature will not be offered to free users, Zoom's CEO said, in case Zoom needed to comply with federal and local law enforcement.
04 June 2020

U.S. Nuclear Contractor Hit with Maze Ransomware, Data Leaked

U.S. Nuclear Contractor Hit with Maze Ransomware, Data Leaked Westech International provides maintenance for the Minuteman III nuclear-missile program and runs programs for multiple branches of the military.
04 June 2020

We Are All in This Together: Responding to the COVID-19 Pandemic

 

Global representatives of the PCI Security Standards Council recently came together, via a virtual video platform, to discuss how the Council is responding to the COVID-19 pandemic, as well as best practices for the payment industry during this unprecedented time.

04 June 2020

Mozilla fixes high‑risk Firefox flaws, bug in DoH feature

The browser maker rolls out updates on back-to-back days, including a patch to avoid unintentionally overloading DNS providers

The post Mozilla fixes high‑risk Firefox flaws, bug in DoH feature appeared first on WeLiveSecurity

04 June 2020

Microsoft Office Files Most Popular for Exploit Tests

A new report examines attacker methodologies to better understand how exploit testing is conducted in the wild.
04 June 2020

How to remove yourself from Internet search results and hide your identity

Here is a step-by-step guide to reducing your digital footprint online, whether you want to lock down data or vanish entirely.
04 June 2020

Could Automation Kill the Security Analyst?

Five skills to ensure job security in the Age of Automation.
04 June 2020

Google Faces Privacy Lawsuit Over Tracking Users in Incognito Mode

Google Faces Privacy Lawsuit Over Tracking Users in Incognito Mode A $5 billion class-action lawsuit filed in a California federal court alleges that Google's Chrome incognito mode collects browser data without people’s knowledge or consent.
04 June 2020

What Usability Means to Security Pros

What Usability Means to Security Pros The last thing cybersecurity executives and practitioners need are even more tools that are difficult to operate. Here's what they look for when assessing new tools.
04 June 2020

ZLoader-Laced Emails Target Unemployed Victims

ZLoader-Laced Emails Target Unemployed Victims Researchers are warning of spear-phishing emails with CV lures that spread the ZLoader malware, which steals banking credentials from victims.
04 June 2020

Incognito mode detection still works in Chrome despite promise to fix

Google said last year that it would fix a bug that allowed sites to detect incognito mode, but no fix ever came.
04 June 2020

Hackers hijack one of Coincheck's domains for spear-phishing attacks

Hackers hijacked Coincheck's domain registrar account and then changed DNS settings.
03 June 2020