Security

Cyber Security Today, Oct. 7, 2022 – Why an overhaul of your business continuity plan is needed, and more

This podcast reports on a presentation at the SecTor conference, an arrest in Australi

Hackers exploit macOS vulnerability to run malicious applications

Attackers are exploiting a macOS vulnerability tracked as CVE-2022-32910 to execute malicious applications. The bug is described as a logic issue that could allow...

Eternity Group behind LilithBot malware

Zscaler researchers traced a newly discovered sample of LilithBot malware to the Eternity group, which is also behind the MaaS malware-as-a-service model. “ThreatLabz recently discovered...

Avast releases free decryptor for variants of Hades ransomware

Avast has published a decryptor for variants of the Hades ransomware after they discovered a bug in the encryption scheme of the Hades strain...

Tucson City becomes the latest victim of data breach

The City of Tucson, Arizona, has revealed it was the victim of a data breach that compromised the personal information of more than 125,000...

BlackByte ransomware exploit legit driver using BYOD technique

BlackByte ransomware is using the "Bring Your Own Driver" technique to exploit an MSI Afterburner RTCore64.sys driver error, which is tracked as CVE-2019-16098. The...

Key findings of the 2022 State of the Threat report

Among the main findings of the State of the Threat Report in 2022 is the fact that ransomware remains the primary threat to private...

Telstra Telecom employee information uploaded online after data breach

Telstra, Australia's largest telecommunications company, has become the latest telecommunications company to deal with a data breach after thousands of employee personal data were...

Subscribe