fbpx

Richard Giddey

Mac Users Beware: New Trojan-Proxy Malware Spreading via Pirated Software

Mac Users Beware: New Trojan-Proxy Malware Spreading via Pirated Software

Unauthorized websites distributing trojanized versions of cracked software have been found to infect Apple macOS users with a new Trojan-Proxy malware. “Attackers can use this type of malware to gain money by building a proxy server network or to perform criminal acts on behalf of the victim: to launch attacks on websites, companies and individuals, […]

Mac Users Beware: New Trojan-Proxy Malware Spreading via Pirated Software Read More »

Redefining the Threat Landscape: Ransomware Trends in 2024

Redefining the Threat Landscape: Ransomware Trends in 2024

Redefining the Threat Landscape: Ransomware Trends in 2024  The Rise of Backup and Disaster Recovery as the Final Bastion in Cybersecurity   As we sail through the cyber seas of 2024, the dark waters of ransomware continue to threaten the digital world. This year, we’re witnessing an unprecedented evolution in ransomware tactics, with groups scaling

Redefining the Threat Landscape: Ransomware Trends in 2024 Read More »

Cybersecurity Firm Hacks Itself, Finds DNS Flaw Leak AWS Credentials

Cybersecurity Firm Hacks Itself, Finds DNS Flaw Leak AWS Credentials

Intruder.io, a London, England-based cybersecurity firm, conducted a self-hack using a DNS rebinding attack, enabling them to extract low-privileged AWS credentials. Cybersecurity firm Intruder has published blog posts explaining how they got hacked by successfully exploiting a DNS rebinding vulnerability that allowed them to extract low-privileged AWS (Amazon Web Services) credentials. They discovered a DNS

Cybersecurity Firm Hacks Itself, Finds DNS Flaw Leak AWS Credentials Read More »

Ransomware in 2024: Anticipated impact, targets, and landscape shift - Help Net Security

Ransomware in 2024: Anticipated impact, targets, and landscape shift – Help Net Security

Ransomware in 2024: Anticipated impact, targets, and landscape shift As ransomware continues to be on the rise, we can expect groups to continue to evolve their attacks and operate at a larger scale for bigger profits. This will put organizations at higher risk if they don’t adopt a more aggressive security strategy. Here is what

Ransomware in 2024: Anticipated impact, targets, and landscape shift – Help Net Security Read More »

The 23andMe Data Breach Keeps Spiraling

The 23andMe Data Breach Keeps Spiraling

More details are emerging about a data breach the genetic testing company 23andMe first reported in October. But as the company shares more information, the situation is becoming even murkier and creating greater uncertainty for users attempting to understand the fallout. 23andMe said at the beginning of October that attackers had infiltrated some of its

The 23andMe Data Breach Keeps Spiraling Read More »

Stellar Cyber Bridges Cybersecurity Skills Gap with First-of-Its-Kind University Program

Stellar Cyber Bridges Cybersecurity Skills Gap with First-of-Its-Kind University Program

Stellar Cyber’s University Program is the only invite-only program designed to meet the needs of educational organizations that provide degrees/certifications in cybersecurity and offer not-for-profit security operations services. SAN JOSE, CA – December 4, 2023 – Today, Stellar Cyber , the innovator of Open XDR technology, announced the launch of its University Program – the

Stellar Cyber Bridges Cybersecurity Skills Gap with First-of-Its-Kind University Program Read More »

ATTACHMENT DETAILS DALL·E-2023-12-10-09.17.16-An-illustration-of-a-nuclear-reactor-pool-during-refueling-showcasing-an-array-of-cylindrical-fuel-assemblies-submerged-in-water-casting-a-blue-glow.

Most Hazardous Nuclear Site | Cyber-Attack

Ministers are under pressure to explain the actions of the government and regulators over cybersecurity at Europe’s most hazardous nuclear site after a Guardian investigation revealed disturbing vulnerabilities in its networks. The shadow energy secretary, Ed Miliband, called on the government to urgently “provide assurances” about Sellafield, after the Guardian revealed it had been hacked

Most Hazardous Nuclear Site | Cyber-Attack Read More »

34 Cyber Monday Laptop Deals and Clickety-Clack Keyboards

34 Cyber Monday Laptop Deals and Clickety-Clack Keyboards

Cyber Monday usually brings a ton of sales on every knick-knack and doodad you probably don’t need, but a lot of people work on a laptop. Snagging one of your favorites for a song is one of the best parts of this shopping holiday. You’ll rarely get a better chance to nab a new computer,

34 Cyber Monday Laptop Deals and Clickety-Clack Keyboards Read More »

Rhysida, the new ransomware gang behind British Library cyber-attack

A new name was added to the cyber-rogues’ gallery of ransomware gangs this week after a criminal group called Rhysida claimed responsibility for an attack on the British Library. The library confirmed that personal data stolen in a cyber-attack last month has appeared for sale online. While the name behind the attack might be relatively

Rhysida, the new ransomware gang behind British Library cyber-attack Read More »

LummaC2 v4.0 Malware Stealing Data with Trigonometry to Detect Human Users

LummaC2 v4.0 Malware Stealing Data with Trigonometry to Detect Human Users

LummaC2 v4.0, an advanced malware, steals data and evades detection by employing trigonometry to distinguish human users from automated analysis tools. Security assessment platform provider Outpost24’s threat intelligence team KrakenLabs has uncovered a new technique that malware developers are using to evade detection in sandbox environments. This technique involves using trigonometry to analyze cursor movements

LummaC2 v4.0 Malware Stealing Data with Trigonometry to Detect Human Users Read More »

Scroll to Top