Cybersecurity News
Hacked! My Twitter user data is out on the dark web -- now what?
Your Twitter user data may now be out there too, including your phone number. Here's how to check and what you can do about it.APT group trojanizes Telegram app – Week in security with Tony Anscombe
StrongPity's backdoor is fitted with various spying features and can record phone calls, collect texts, and gather call logs and contact lists
The post APT group trojanizes Telegram app – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Introducing IPyIDA: A Python plugin for your reverse‑engineering toolkit
ESET Research announces IPyIDA 2.0, a Python plugin integrating IPython and Jupyter Notebook into IDA
The post Introducing IPyIDA: A Python plugin for your reverse‑engineering toolkit appeared first on WeLiveSecurity
Now you can legally repair your tech – sort of
A new law portends a future where (we hope) it will be easier for us all to repair, fix, upgrade, and just tinker with things we already own
The post Now you can legally repair your tech – sort of appeared first on WeLiveSecurity
Microsoft Patch Tuesday, January 2023 Edition
Microsoft today released updates to fix nearly 100 security flaws in its Windows operating systems and other software. Highlights from the first Patch Tuesday of 2023 include a zero-day vulnerability in Windows, printer software flaws reported by the U.S. National Security Agency, and a critical Microsoft SharePoint Server bug that allows a remote, unauthenticated attacker to make an anonymous connection.StrongPity espionage campaign targeting Android users
ESET researchers identified an active StrongPity campaign distributing a trojanized version of the Android Telegram app, presented as the Shagle app – a video-chat service that has no app version
The post StrongPity espionage campaign targeting Android users appeared first on WeLiveSecurity
Identity Thieves Bypassed Experian Security to View Credit Reports
Identity thieves have been exploiting a glaring security weakness in the website of Experian, one of the big three consumer credit reporting bureaus. Normally, Experian requires that those seeking a copy of their credit report successfully answer several multiple choice questions about their financial history. But until the end of 2022, Experian's website allowed anyone to bypass these questions and go straight to the consumer's report. All that was needed was the person's name, address, birthday and Social Security number.Cracked it! Highlights from KringleCon 5: Golden Rings
Learning meets fun at the 2022 SANS Holiday Hack Challenge – strap yourself in for a crackerjack ride at the North Pole as I foil Grinchum's foul plan and recover the five golden rings
The post Cracked it! Highlights from KringleCon 5: Golden Rings appeared first on WeLiveSecurity
Hybrid work: Turning business platforms into preferred social spaces
Hybrid work and hybrid play now merge into hybrid living, but where is the line between the two? Is there one?
The post Hybrid work: Turning business platforms into preferred social spaces appeared first on WeLiveSecurity
Ransomware target list – Week in security with Tony Anscombe
Why schools, hospitals, local governments and other public sector organizations are in a sweet spot for ransomware attacks
The post Ransomware target list – Week in security with Tony Anscombe appeared first on WeLiveSecurity
The doctor will see you now … virtually: Tips for a safe telehealth visit
Are your virtual doctor visits private and secure? Here’s what to know about, and how to prepare for, connecting with a doctor from the comfort of your home.
The post The doctor will see you now … virtually: Tips for a safe telehealth visit appeared first on WeLiveSecurity
Gaming: How much is too much for our children?
With many children spending a little too much time playing video games, learn to spot the signs things may be spinning out of control
The post Gaming: How much is too much for our children? appeared first on WeLiveSecurity
The world’s most common passwords: What to do if yours is on the list
Do you use any of these extremely popular – and eminently hackable – passwords? If so, we have a New Year’s resolution for you.
The post The world’s most common passwords: What to do if yours is on the list appeared first on WeLiveSecurity
Happy 13th Birthday, KrebsOnSecurity!
KrebsOnSecurity turns 12 years old today. That's a crazy long time for an independent media outlet these days, but then again I'm liable to keep doing this as long as they keep letting me! Thanks to your readership and support, I was able to spend more time in 2022 on in-depth investigative stories -- the really satisfying kind with the potential to affect positive change. Some of that work is highlighted in the 2022 Year in Breaches review below.Happy 12th Birthday, KrebsOnSecurity!
KrebsOnSecurity turns 12 years old today. That's a crazy long time for an independent media outlet these days, but then again I'm liable to keep doing this as long as they keep letting me! Thanks to your readership and support, I was able to spend more time in 2022 on in-depth investigative stories -- the really satisfying kind with the potential to affect positive change. Some of that work is highlighted in the 2022 Year in Breaches review below.Cybersecurity trends and challenges to look out for in 2023
What are some of the key cybersecurity trends and themes that organizations should have on their radars in 2023?
The post Cybersecurity trends and challenges to look out for in 2023 appeared first on WeLiveSecurity
Cybersecurity firm links Piers Morgan Twitter hack to leak of 400m records

Former Australian prime minister Scott Morrison among politicians and celebrities whose details were in sample of allegedly hacked data published online
The former Australian prime minister Scott Morrison appears to have been caught up in a leak of partial data on 400 million Twitter users, along with celebrities including the model Cara Delevingne, US politician Alexandria Ocasio-Cortez and pop singer Shawn Mendes.
Morrison’s Twitter account was included in a sample of data released by an alleged cybercriminal last week.
Continue reading...2022 in review: 10 of the year’s biggest cyberattacks
The past year has seen no shortage of disruptive cyberattacks – here’s a round-up of some of the worst hacks and breaches that have impacted a variety of targets around the world in 2022
The post 2022 in review: 10 of the year’s biggest cyberattacks appeared first on WeLiveSecurity
‘Tis the season for gaming: Keeping children safe (and parents sane)
It’s all fun and games over the holidays, but is your young gamer safe from the darker side of the action?
The post ‘Tis the season for gaming: Keeping children safe (and parents sane) appeared first on WeLiveSecurity