Cybersecurity News
The new PPI? Claims firms turn their fire on data breaches

People are being told they are entitled to compensation as more companies move into the industry
Claims companies and law firms looking for the next bonanza in payouts are targeting people who have been the victim of a data breach, with some telling those affected they could be entitled to thousands of pounds in compensation.
A Google search for the term “data breach claim” results in a long list of firms – the vast majority of them no-win, no-fee solicitors – and there are more moving into this space all the time. Meanwhile, adverts for firms are increasingly appearing in Instagram feeds.
Continue reading...Next-Gen Maldocs & How to Solve the Human Vulnerability

‘Appalling’ Riot Games Job Fraud Takes Aim at Wallets

Zero Day in Ubiquitous Apache Log4j Tool Under Active Attack

Sprawling Active Attack Aims to Take Over 1.6M WordPress Sites

Week in security with Tony Anscombe
How 'shoulder surfers' could hack into your Snapchat – Staying safe from gift card fraud – What is a buffer overflow vulnerability?
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
‘Karakurt’ Extortion Threat Emerges, But Says No to Ransomware

Canadian Ransomware Arrest Is a Meaningful Flex, Experts Say

Fueled by Pandemic Realities, Grinchbots Aggressively Surge in Activity

How MikroTik Routers Became a Cybercriminal Target

SnapHack: Watch out for those who can hack into anyone’s Snapchat!
Oh snap! This is how easy it may be for somebody to hijack your Snapchat account – all they need to do is peer over your shoulder.
The post SnapHack: Watch out for those who can hack into anyone’s Snapchat! appeared first on WeLiveSecurity
Canada Charges Its “Most Prolific Cybercriminal”
A 31-year-old Canadian man has been arrested and charged with fraud in connection with numerous ransomware attacks against businesses, government agencies and private citizens throughout Canada and the United States. Canadian authorities describe him as "the most prolific cybercriminal we've identified in Canada," but so far they've released few other details about the investigation or the defendant. Helpfully, an email address and nickname apparently connected to the accused offer some additional clues.Malicious npm Code Packages Built for Hijacking Discord Servers

Moobot Botnet Chews Up Hikvision Surveillance Systems

Not with a Bang but a Whisper: The Shift to Stealthy C2

Critical SonicWall VPN Bugs Allow Complete Appliance Takeover

AWS Among 12 Cloud Services Affected by Flaws in Eltima SDK

Emotet’s Behavior & Spread Are Omens of Ransomware Attacks

Windows 10 Drive-By RCE Triggered by Default URI Handler

Windows 10 Drive-By RCE Triggered by Default URI Handler
