Cybersecurity News
Cybersecurity careers: What to know and how to get started
Want to help make technology safer for everyone? Love solving puzzles? Looking for a rewarding career? Break into cybersecurity! Insights from ESET researchers Aryeh Goretsky and Cameron Camp will put you on the right track.
The post Cybersecurity careers: What to know and how to get started appeared first on WeLiveSecurity
US judge sentences duo for roles in running bulletproof hosting service
The hosting service was used to deploy malware payloads including Zeus and the Blackhole exploit kit.Brave browser replaces Google with its own search engine
Brave Search will become the default search option for new users in the US, UK, Canada, Germany and France, with more countries to follow soon
The post Brave browser replaces Google with its own search engine appeared first on WeLiveSecurity
Brave browser replaces Google with its own search engine
Brave Search will become the default search option for new users in the US, UK, Canada, Germany and France, with more countries to follow soon
The post Brave browser replaces Google with its own search engine appeared first on WeLiveSecurity
Google Crushes YouTube Cookie-Stealing Channel Hijackers
Google has caught and brushed off a bunch of cookie-stealing YouTube channel hijackers who were running cryptocurrency scams on, or auctioning off, ripped-off channels.VPN Exposes Data for 1M Users, Leading to Researcher Questioning
Experts warn that virtual private networks are increasingly vulnerable to leaks and attack.Cybersecurity Month: Consider a Cyber Career
As an Official Champion of National Cyber Security Awareness Month (NCSAM), the Council will be sharing educational resources on payment security best practices on the PCI Perspectives blog, and through our Twitter (@PCISSC) and LinkedIn pages. The Council will align these resources with the four weekly themes outlined by the National Cyber Security Alliance:
Geriatric Microsoft Bug Exploited by APT Using Commodity RATs
Disguised as an IT firm, the APT is hitting targets in Afghanistan & India, exploiting a 20-year-old+ Microsoft Office bug that's as potent as it is ancient.Black market traders cash in on fake COVID-19 vaccination records
The EU vaccine passport and CDC certifications are hot ticket items.Squirrel Bug Lets Attackers Execute Code in Games, Cloud Services
The out-of-bounds read vulnerability enables an attacker to escape a Squirrel VM in games with millions of monthly players – such as Counter-Strike: Global Offensive and Portal 2 – and in cloud services such as Twilio Electric Imp.Fresh APT Harvester Reaps Telco, Government Data
The group is likely nation-state-backed and is mounting an ongoing spy campaign using custom malware and stealthy tactics.$5.2 billion worth of Bitcoin transactions possibly tied to ransomware
Threat actors are increasingly using advanced tactics to obfuscate and launder their illicit gains, a report by the US Government finds
The post $5.2 billion worth of Bitcoin transactions possibly tied to ransomware appeared first on WeLiveSecurity
$5.2 billion worth of Bitcoin transactions possibly tied to ransomware
Threat actors are increasingly using advanced tactics to obfuscate and launder their illicit gains, a report by the US Government finds
The post $5.2 billion worth of Bitcoin transactions possibly tied to ransomware appeared first on WeLiveSecurity
Lyceum APT Returns, This Time Targeting Tunisian Firms
The APT, which targets Middle-Eastern energy firms & telecoms, has been relatively quiet since its exposure but not entirely silent. It's kept up attacks through 2021 and is working on retooling its arsenal yet again.A Guide to Doing Cyberintelligence on a Restricted Budget
Cybersecurity budget cuts are everywhere. Chad Anderson, senior security researcher at DomainTools, discusses alternatives to fancy tooling, and good human skills alignment.At least 13 phone firms hit by suspected Chinese hackers since 2019, say experts
LightBasin hackers were able to obtain subscriber information and call metadata, says CrowdStrike
At least 13 phone companies around the world have been compromised since 2019 by sophisticated hackers who are believed to come from China, a cybersecurity expert group has said.
The roaming hackers – known as LightBasin – were able to “search and find” individual mobile phones and “target accordingly”, according to CrowdStrike, a group regularly cited by western intelligence.
Continue reading...Feds Warn BlackMatter Ransomware Gang is Poised to Strike
An advisory by the CISA, FBI and NSA reveals hallmark tactics of and shares defense tips against the cybercriminal group that’s picked up where its predecessor DarkSide left off.FCC mulls over new rules demanding carriers block spam robot texts at network level
The proposal hones in on rising rates of robot texts.A recipe for failure: Predictably poor passwords
Security professionals advise to never use ‘beef stew’ as a password. It just isn’t stroganoff.
The post A recipe for failure: Predictably poor passwords appeared first on WeLiveSecurity
A recipe for failure: Predictably poor passwords
Security professionals advise to never use ‘beef stew’ as a password. It just isn’t stroganoff.
The post A recipe for failure: Predictably poor passwords appeared first on WeLiveSecurity