Cybersecurity News
Spam Kingpin Peter Levashov Gets Time Served
A federal judge in Connecticut today handed down a sentence of time served to spam kingpin Peter “Severa” Levashov, a prolific purveyor of malicious and junk email, and the creator of malware strains that infected millions of Microsoft computers globally. Levashov has been in federal custody since his extradition to the United States and guilty plea in 2018, and was facing up to 12 more years in prison. Instead, he will go free under three years of supervised release and a possible fine.Researchers: NSO Group’s Pegasus Spyware Should Spark Bans, Apple Accountability
![Researchers: NSO Group’s Pegasus Spyware Should Spark Bans, Apple Accountability Researchers: NSO Group’s Pegasus Spyware Should Spark Bans, Apple Accountability](https://media.threatpost.com/wp-content/uploads/sites/103/2021/07/20141444/white-pegasus-150x150.jpg)
Back-to-Basics: Reduce Where Payment Data Can Be Found
As small and medium businesses begin to re-open following the pandemic, it’s important to do so securely in order to protect customer’s payment card data. Too often, data breaches happen as a result of vulnerabilities that are entirely preventable. The PCI Security Standards Council (PCI SSC) has developed a set of payment protection resources for small businesses. In this 8-part back-to-basics series, we highlight payment security basics for protecting against payment data theft. Today’s blog focuses on reducing where payment data can be found.
Law Firm to the Fortune 500 Breached with Ransomware
![Law Firm to the Fortune 500 Breached with Ransomware Law Firm to the Fortune 500 Breached with Ransomware](https://media.threatpost.com/wp-content/uploads/sites/103/2021/07/20131357/lady-justice-1-150x150.jpeg)
Why Your Business Needs a Long-Term Remote Security Strategy
![Why Your Business Needs a Long-Term Remote Security Strategy Why Your Business Needs a Long-Term Remote Security Strategy](https://media.threatpost.com/wp-content/uploads/sites/103/2020/04/17101515/zoom-meeting-150x150.jpg)
16-Year-Old HP Printer-Driver Bug Impacts Millions of Windows Machines
![16-Year-Old HP Printer-Driver Bug Impacts Millions of Windows Machines 16-Year-Old HP Printer-Driver Bug Impacts Millions of Windows Machines](https://media.threatpost.com/wp-content/uploads/sites/103/2021/07/02081934/printer-150x150.jpg)
A New Security Paradigm: External Attack Surface Management
![A New Security Paradigm: External Attack Surface Management A New Security Paradigm: External Attack Surface Management](https://media.threatpost.com/wp-content/uploads/sites/103/2021/07/13140025/External-Attack-Surface-Management-150x150.jpg)
MosaicLoader Malware Delivers Facebook Stealers, RATs
![MosaicLoader Malware Delivers Facebook Stealers, RATs MosaicLoader Malware Delivers Facebook Stealers, RATs](https://media.threatpost.com/wp-content/uploads/sites/103/2021/07/20083844/mosaic-1-150x150.jpg)
Some URL shortener services distribute Android malware, including banking or SMS trojans
On iOS we have seen link shortener services pushing spam calendar files to victims’ devices.
The post Some URL shortener services distribute Android malware, including banking or SMS trojans appeared first on WeLiveSecurity
HP patches vulnerable driver lurking in printers for 16 years
Cyberattackers could exploit the bug to secure system-level privileges.Microsoft heads to court to take on imposter, homoglyph domains
Fake domains impersonating Microsoft are a thorn not only in the company's side but in that of its customers.What’s Next for REvil’s Victims?
![What’s Next for REvil’s Victims? What’s Next for REvil’s Victims?](https://media.threatpost.com/wp-content/uploads/sites/103/2021/07/19190425/servers-on-fire-150x150.jpeg)
Unpatched iPhone Bug Allows Remote Device Takeover
![Unpatched iPhone Bug Allows Remote Device Takeover Unpatched iPhone Bug Allows Remote Device Takeover](https://media.threatpost.com/wp-content/uploads/sites/103/2021/03/31152348/iphone-privacy-150x150.jpg)
Law Firm for Ford, Pfizer, Exxon Discloses Ransomware Attack
Campbell Conroy & O'Neil reports the attack affected personal data including Social Security numbers, passport numbers, and payment card data for some individuals.Don’t Wanna Pay Ransom Gangs? Test Your Backups.
Browse the comments on virtually any story about a ransomware attack and you will almost surely encounter the view that the victim organization could have avoided paying their extortionists if only they'd had proper data backups. But the ugly truth is there are many non-obvious reasons why victims end up paying even when they have done nearly everything right from a data backup perspective.US Accuses China of Using Criminal Hackers in Cyber Espionage Operations
![US Accuses China of Using Criminal Hackers in Cyber Espionage Operations US Accuses China of Using Criminal Hackers in Cyber Espionage Operations](https://img.deusm.com/darkreading/China4.png)
US Accuses China of Using Criminal Hackers in Cyber Espionage Operations
![US Accuses China of Using Criminal Hackers in Cyber Espionage Operations US Accuses China of Using Criminal Hackers in Cyber Espionage Operations](https://img.deusm.com/darkreading/China4.png)
How Gaming Attack Data Aids Defenders Across Industries
![How Gaming Attack Data Aids Defenders Across Industries How Gaming Attack Data Aids Defenders Across Industries](https://img.deusm.com/darkreading/EdgeGaming/EdgeGaming602x250.jpg)
NSO Group Spyware Used On Journalists & Activists Worldwide
An investigation finds Pegasus spyware, intended for use on criminals and terrorists, has been used in targeted campaigns against others around the world.Ruthless Attackers Target Florida Condo Collapse Victims
![Ruthless Attackers Target Florida Condo Collapse Victims Ruthless Attackers Target Florida Condo Collapse Victims](https://media.threatpost.com/wp-content/uploads/sites/103/2021/07/19143849/Surfside-150x150.jpg)