Cybersecurity News


Why Paper Receipts are Money at the Drive-Thru

Check out the handmade sign posted to the front door of a shuttered Jimmy John's sandwich chain shop in Missouri last week. See if you can tell from the store owner's message what happened.
20 June 2022

Crypto mixers: What are they and how are they used?

How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money

The post Crypto mixers: What are they and how are they used? appeared first on WeLiveSecurity

20 June 2022

How to spot malicious spam – Week in security with Tony Anscombe

As the risk of receiving a malware-laden email increases, take a moment to consider how to spot attacks involving malicious spam

The post How to spot malicious spam – Week in security with Tony Anscombe appeared first on WeLiveSecurity

17 June 2022

China-linked APT Flew Under Radar for Decade

China-linked APT Flew Under Radar for Decade Evidence suggests that a just-discovered APT has been active since 2013.
17 June 2022

State-Sponsored Phishing Attack Targeted Israeli Military Officials

State-Sponsored Phishing Attack Targeted Israeli Military Officials Analysts have uncovered an Iran-linked APT sending malicious emails to top Israeli government officials.
16 June 2022

Ransomware Risk in Healthcare Endangers Patients

Ransomware Risk in Healthcare Endangers Patients Ryan Witt, Proofpoint's Healthcare Cybersecurity Leader, examines the impact of ransomware on patient care.
16 June 2022

Facebook Messenger Scam Duped Millions

Facebook Messenger Scam Duped Millions One well crafted phishing message sent via Facebook Messenger ensnared 10 million Facebook users and counting.
16 June 2022

How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security

Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents?

The post How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security appeared first on WeLiveSecurity

16 June 2022

DragonForce Gang Unleash Hacks Against Govt. of India

DragonForce Gang Unleash Hacks Against Govt. of India In response to a comment about the Prophet Mohammed, a hacktivist group in Malaysia has unleashed a wave of cyber attacks in India.
15 June 2022

Travel-related Cybercrime Takes Off as Industry Rebounds

Travel-related Cybercrime Takes Off as Industry Rebounds Upsurge in the tourism industry after the COVID-19 pandemic grabs the attention of cybercriminals to scam the tourists.
15 June 2022

In Cybersecurity, What You Can’t See Can Hurt You

In Cybersecurity, What You Can’t See Can Hurt You The dangers to SMBs and businesses of all sizes from cyberattacks are well known. But what’s driving these attacks, and what do cybersecurity stakeholders need to do that they’re not already doing?
15 June 2022

Microsoft Patch Tuesday, June 2022 Edition

Microsoft on Tuesday released software updates to fix 60 security vulnerabilities in its Windows operating systems and other software, including a zero-day flaw in all supported Microsoft Office versions on all flavors of Windows that's seen active exploitation for at least two months now. On a lighter note, Microsoft is officially retiring its Internet Explorer (IE) web browser, which turns 27 years old this year.
15 June 2022

Ransomware Group Debuts Searchable Victim Data

Cybercrime groups that specialize in stealing corporate data and demanding a ransom not to publish it have tried countless approaches to shaming their victims into paying. The latest innovation in ratcheting up the heat comes from the ALPHV/BlackCat ransomware group, which has traditionally published any stolen victim data on the Dark Web. Today, however, the group began publishing individual victim websites on the public Internet, with the leaked data made available in an easily searchable form.
14 June 2022

Paving the Way: Inspiring Women in Payments - A Q&A featuring Laura Godoy

 

Laura Godoy is all too familiar with the “glass ceiling” that exists for women in technology professions. Over the years she has seen many women abandon their careers and their dreams because of societal beliefs about the roles of women. In this edition of our blog, Laura discusses her passion for fighting for equality for women in technology professions and how women already have the tools to change their working conditions.

14 June 2022

Kaiser Permanente Exposes Nearly 70K Medical Records in Data Breach

Kaiser Permanente Exposes Nearly 70K Medical Records in Data Breach Attackers gained access to private account details through an email compromise incident that occurred in April.
14 June 2022

Linux Malware Deemed ‘Nearly Impossible’ to Detect

Linux Malware Deemed ‘Nearly Impossible’ to Detect Symbiote, discovered in November, parasitically infects running processes so it can steal credentials, gain rootlkit functionality and install a backdoor for remote access.
14 June 2022

“Downthem” DDoS-for-Hire Boss Gets 2 Years in Prison

A 33-year-old Illinois man was sentenced to two years in prison today following his conviction last year for operating services that allowed paying customers to launch powerful distributed denial-of-service (DDoS) attacks against hundreds of thousands of Internet users and websites.
13 June 2022

Request for Comments: New Mobile Payments on COTS (MPoC) Standard


From 13 June to 15 July 2022, Participating Organizations, PCI-recognized Laboratories, PCI-recognized Assessors, and Approved Scanning Vendors are invited to review and provide feedback on the new Mobile Payments on COTS (MPoC) Standard during a 30-day request for comments (RFC) period.

13 June 2022

Bluetooth Signals Can Be Used to Track Smartphones, Say Researchers

Bluetooth Signals Can Be Used to Track Smartphones, Say Researchers Researchers demonstrated a possible way to track individuals via Bluetooth signals.
13 June 2022

Industroyer: A cyber‑weapon that brought down a power grid

Five years ago, ESET researchers released their analysis of the first ever malware that was designed specifically to attack power grids

The post Industroyer: A cyber‑weapon that brought down a power grid appeared first on WeLiveSecurity

13 June 2022