Cybersecurity News
How secure is your cloud storage? Mitigating data security risks in the cloud
As cloud systems are increasingly the bedrock on which digital transformation is built, keeping a close eye on how they are secured is an essential cybersecurity best practice
The post How secure is your cloud storage? Mitigating data security risks in the cloud appeared first on WeLiveSecurity
VMware warns of critical remote code execution bug in Workspace ONE Access
Other severe vulnerabilities have been resolved.Zoom awarded $1.8 million in bug bounty rewards over 2021
The program has paid out $2.4 million since its launch.Israeli officials are being catfished by AridViper hackers
APT-C-23 is targeting high-ranking individuals in defense, law, and emergency services.The Original APT: Advanced Persistent Teenagers
Many organizations are already struggling to combat cybersecurity threats from ransomware purveyors and state-sponsored hacking groups, both of which tend to take days or weeks to pivot from an opportunistic malware infection to a full blown data breach. But few organizations have a playbook for responding to the kinds of virtual "smash and grab" attacks we've seen recently from LAPSUS$, a juvenile data extortion group whose short-lived, low-tech and remarkably effective tactics are putting some of the world's biggest corporations on edge.Attackers Spoof WhatsApp Voice-Message Alerts to Steal Info
Threat actors target Office 365 and Google Workspace in a new campaign, which uses a legitimate domain associated with a road-safety center in Moscow to send messages.This new malware targets AWS Lambda environments
Denonia malware is abusing servers to run cryptocurrency miners.Fake e‑shops on the prowl for banking credentials using Android malware
ESET researchers analyzed three malicious applications targeting customers of eight Malaysian banks
The post Fake e‑shops on the prowl for banking credentials using Android malware appeared first on WeLiveSecurity
Fake Android shopping apps steal bank account logins, 2FA codes
Customers of Malaysian banks are being turned into cash cows.Authorities Fully Behead Hydra Dark Marketplace
The popular underground market traded in drugs, stolen data, forged documents and more -- raking in billions in Bitcoin.FIN7 hackers evolve operations with ransomware, novel backdoor
Researchers have explored the shift in the sophisticated group's latest tactics.No-Joke Borat RAT Propagates Ransomware, DDoS
This fresh malware strain extends the functionality of typical trojans with advanced functionality and a series of modules for launching various types of threat activity.GitHub now scans for secret leaks in developer workflows
The new tool aims to protect developers against API and token exposure.US judge sentences men for $1.5 million Apple Gift Card scam
Apple is also owed over $1 million in damages.We’re going on Tor
If better privacy and anonymity sound like music to your ears, you may not need to look much further than Tor Browser. Here’s what it’s like to surf the dark web using the browser.
The post We’re going on Tor appeared first on WeLiveSecurity
Borat RAT malware: a 'unique' triple threat that is far from funny
The malware combines remote access, spyware, and ransomware into one nasty package.Turkey seeks 40,000-year sentences for alleged cryptocurrency exit scammers
21 suspects are wanted in connection to a defunct Turkish crypto exchange.Week in security with Tony Anscombe
Under the hood of Wslink's VM – The energy sector & cyber-risk – SMB cybersecurity survival tips
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity