Cybersecurity News
What’s it like to work as a malware researcher? 10 questions answered
Three ESET malware researchers describe what their job involves and what it takes to embark on a successful career in this field
The post What’s it like to work as a malware researcher? 10 questions answered appeared first on WeLiveSecurity
Arrests were made, but the Mekotio Trojan lives on
Law enforcement cut off tails, but not the head of the cybercriminal operation.Squid Game Crypto Scammers Rips Off Investors for Millions

Ransomware Gangs Target Corporate Financial Activities

Android Patches Actively Exploited Zero-Day Kernel Bug

Man charged with hacking major US sports leagues to illegally stream games
On top of illegally streaming sports games for profit, the man is also believed to have attempted to extort MLB for $150,000
The post Man charged with hacking major US sports leagues to illegally stream games appeared first on WeLiveSecurity
Man charged with hacking major US sports leagues to illegally stream games
On top of illegally streaming sports games for profit, the man is also believed to have attempted to extort MLB for $150,000
The post Man charged with hacking major US sports leagues to illegally stream games appeared first on WeLiveSecurity
Apple macOS Flaw Allows Kernel-Level Compromise

The ‘Groove’ Ransomware Gang Was a Hoax
A number of publications in September warned about the emergence of "Groove," a new ransomware group that called on competing extortion gangs to unite in attacking U.S. government interests online. It now appears that Groove was all a big hoax designed to toy with security firms and journalists.Squid Game cryptocurrency creators pull the rug from under investors, steal millions
The coin has crashed in what appears to be an exit scam.Cybercriminals flog access to international shipping, logistics giants
The underground hosts initial access brokers with entry to companies key in global supply chains.Office 365 Phishing Campaign Uses Kaspersky’s Amazon SES Token

Pirate Sports Streamer Gets Busted, Pivots to MLB Extortion

‘Trojan Source’ Hides Invisible Bugs in Source Code

‘Trojan Source’ Bug Threatens the Security of All Code
Virtually all compilers -- programs that transform human-readable source code into computer-executable machine code -- are vulnerable to an insidious attack in which an adversary can introduce targeted vulnerabilities into any software without being detected, new research released today warns. The vulnerability disclosure was coordinated with multiple organizations, some of whom are now releasing updates to address the security weakness.Google Chrome is Abused to Deliver Malware as ‘Legit’ Win 10 App

Week in security with Tony Anscombe
ESET discovers Wslink – Why secure-by-design is a must – Staying cybersecure this Halloween and beyond – Operation Dark HunTOR
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Week in security with Tony Anscombe
ESET discovers Wslink – Why secure-by-design is a must – Staying cybersecure this Halloween and beyond – Operation Dark HunTOR
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
All Sectors Are Now Prey as Cyber Threats Expand Targeting

Suspected REvil Gang Insider Identified
