Cybersecurity News
Spam Kingpin Peter Levashov Gets Time Served
A federal judge in Connecticut today handed down a sentence of time served to spam kingpin Peter “Severa” Levashov, a prolific purveyor of malicious and junk email, and the creator of malware strains that infected millions of Microsoft computers globally. Levashov has been in federal custody since his extradition to the United States and guilty plea in 2018, and was facing up to 12 more years in prison. Instead, he will go free under three years of supervised release and a possible fine.Researchers: NSO Group’s Pegasus Spyware Should Spark Bans, Apple Accountability

Back-to-Basics: Reduce Where Payment Data Can Be Found
As small and medium businesses begin to re-open following the pandemic, it’s important to do so securely in order to protect customer’s payment card data. Too often, data breaches happen as a result of vulnerabilities that are entirely preventable. The PCI Security Standards Council (PCI SSC) has developed a set of payment protection resources for small businesses. In this 8-part back-to-basics series, we highlight payment security basics for protecting against payment data theft. Today’s blog focuses on reducing where payment data can be found.
Law Firm to the Fortune 500 Breached with Ransomware

Why Your Business Needs a Long-Term Remote Security Strategy

16-Year-Old HP Printer-Driver Bug Impacts Millions of Windows Machines

A New Security Paradigm: External Attack Surface Management

MosaicLoader Malware Delivers Facebook Stealers, RATs

Some URL shortener services distribute Android malware, including banking or SMS trojans
On iOS we have seen link shortener services pushing spam calendar files to victims’ devices.
The post Some URL shortener services distribute Android malware, including banking or SMS trojans appeared first on WeLiveSecurity
HP patches vulnerable driver lurking in printers for 16 years
Cyberattackers could exploit the bug to secure system-level privileges.Microsoft heads to court to take on imposter, homoglyph domains
Fake domains impersonating Microsoft are a thorn not only in the company's side but in that of its customers.What’s Next for REvil’s Victims?

Unpatched iPhone Bug Allows Remote Device Takeover

Law Firm for Ford, Pfizer, Exxon Discloses Ransomware Attack
Campbell Conroy & O'Neil reports the attack affected personal data including Social Security numbers, passport numbers, and payment card data for some individuals.Don’t Wanna Pay Ransom Gangs? Test Your Backups.
Browse the comments on virtually any story about a ransomware attack and you will almost surely encounter the view that the victim organization could have avoided paying their extortionists if only they'd had proper data backups. But the ugly truth is there are many non-obvious reasons why victims end up paying even when they have done nearly everything right from a data backup perspective.US Accuses China of Using Criminal Hackers in Cyber Espionage Operations

US Accuses China of Using Criminal Hackers in Cyber Espionage Operations

How Gaming Attack Data Aids Defenders Across Industries

NSO Group Spyware Used On Journalists & Activists Worldwide
An investigation finds Pegasus spyware, intended for use on criminals and terrorists, has been used in targeted campaigns against others around the world.Ruthless Attackers Target Florida Condo Collapse Victims
