Cybersecurity News
US gov’t warns against paying off ransomware attackers
Companies facilitating ransomware payments run the risk of facing stern penalties for violating US regulations
The post US gov’t warns against paying off ransomware attackers appeared first on WeLiveSecurity
Grindr’s Bug Bounty Pledge Doesn’t Translate to Security

New HEH botnet can wipe routers and IoT devices
The disk-wiping feature is present in the code but has not been used yet.Male Chastity Device Comes with Massive Security Flaws

Boom! Mobile Customer Data Lost to Fullz House/Magecart Attack

Women in Payments: Q&A with Diana Greenhaw
Protecting data is everyone’s responsibility, according to Diana Greenhaw who followed a nontraditional path into the security space. In this month’s blog series, Greenhaw explains why you don’t have to be an information technology expert to work in cybersecurity.
Chrome 86 released with password-related security improvements
The new Native File System API now also lets websites to interact with any file or folder stored on the user's local disk.Microsoft Zerologon Flaw Under Attack By Iranian Nation-State Actors

COVID-19 Clinical Trials Slowed After Ransomware Attack

APT Attack Injects Malware into Windows Error Reporting

Unpatched Apple T2 Chip Flaw Plagues Macs

Had your face stolen lately?
It’s easy to reset your password or PIN after a data breach. But reset your face? Not so much.
The post Had your face stolen lately? appeared first on WeLiveSecurity
Post Grid WordPress Plugin Flaws Allow Site Takeovers

Black-T Malware Emerges From Cryptojacker Group TeamTNT

Malware Families Turn to Legit Pastebin-Like Service

Rare Bootkit Malware Targets North Korea-Linked Diplomats

Tenda Router Zero-Days Emerge in Spyware Botnet Campaign

Video-Game Piracy Group ‘Team Xecuter’ Leaders in Custody

Four npm packages found uploading user details on a GitHub page
Collected information included IP address, country, city, computer username, home directory path, and CPU model.5 steps to secure your connected devices
As we steadily adopt smart devices into our lives, we shouldn’t forget about keeping them secured and our data protected
The post 5 steps to secure your connected devices appeared first on WeLiveSecurity