Cybersecurity News
When Scammers Get Scammed, They Take It to Cybercrime Court

Paving the way: Inspiring Women in Payments - A Q&A featuring Jessica Smith
With inspiration from her family of engineers, Jessica Smith was raised to approach problem-solving with curiosity, critical thinking, and creativity. These skillsets have helped her to pivot in a career path that started in photography, developed into finance and auditing, and now focuses on information security standards and compliance for the payments industry. In this edition of our blog, Jessica explains that working for a company that encourages the exploration of new skills and cross-training, including harnessing the power of mentorship programs, can make all the difference in one’s success.
Google Takes Down Glupteba Botnet; Files Lawsuit Against Operators

SolarWinds Attackers Spotted Using New Tactics, Malware

5 common gift card scams and how to spot them
It often pays to look a gift horse in the mouth – recognizing these types of gift card fraud will go a long way toward helping you stay safe from this growing threat not just this holiday season
The post 5 common gift card scams and how to spot them appeared first on WeLiveSecurity
Crypto-Exchange BitMart to Pay Users for $200M Theft

Are You Guilty of These 8 Network-Security Bad Practices?

Cyber Command Publicly Joins Fight Against Ransomware Groups

Cuba Ransomware Gang Hauls in $44M in Payouts

Pegasus Spyware Infects U.S. State Department iPhones

Apache Kafka Cloud Clusters Expose Sensitive Data for Large Companies

What are buffer overflow attacks and how are they thwarted?
Ever since the Morris worm, buffer overflows have become notorious fare in the world of vulnerabilities
The post What are buffer overflow attacks and how are they thwarted? appeared first on WeLiveSecurity
Who Is the Network Access Broker ‘Babam’?
Rarely do cybercriminal gangs that deploy ransomware gain the initial access to the target themselves. More commonly, that access is purchased from a cybercriminal broker who specializes in stealing remote access credentials -- such as usernames and passwords needed to remotely connect to the target's network. In this post we'll look at the clues left behind by "Babam," the handle chosen by a cybercriminal who has sold such access to ransomware groups on many occasions over the past few years.Pandemic-Influenced Car Shopping: Just Use the Manufacturer API

Omicron Phishing Scam Already Spotted in UK

NSO Group spyware used to hack at least nine US officials’ phones – report

Revelation comes just weeks after the Biden administration placed NSO on a US blacklist
The iPhones of at least nine US state department officials were recently hacked by a government using NSO Group spyware, according to a new report that raised serious questions about the use of Israeli surveillance tools against US government officials around the world.
The claim, which was reported by Reuters, comes just weeks after the Biden administration placed NSO on a US blacklist and said the surveillance company acted “contrary to the foreign policy and national security interests of the US”.
Continue reading...What Are Your Top Cloud Security Challenges? Threatpost Poll

Week in security with Tony Anscombe
ESET researchers analyze malware frameworks targeting air-gapped networks – ESET Research launches a podcast – INTERPOL cracks down on online fraud
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Scammers exploit Omicron fears in new COVID‑19 phishing campaign
Fraudsters take advantage of the emergence of the new variant to dupe unsuspecting victims out of their sensitive data
The post Scammers exploit Omicron fears in new COVID‑19 phishing campaign appeared first on WeLiveSecurity
Threat Group Takes Aim Again at Cloud Platform Provider Zoho
