fbpx

Cybersecurity & IT Threats

Expanding ‘IT Threats’ to include various aspects of cybersecurity, not just threats.

Fifth of UK Cybersecurity Pros Work Excessive Hours - Infosecurity Magazine

Fifth of UK Cybersecurity Pros Work Excessive Hours – Infosecurity Magazine

The UK’s cybersecurity professionals believe they have excellent career prospects and are employed in a “booming” sector, but many are working unsafe hours, according to a new report from the Chartered Institute of Information Security (CIISec). Published today, the institute’s 2022/2023 State of the Profession report is compiled from interviews with 302 security professionals. On […]

Fifth of UK Cybersecurity Pros Work Excessive Hours – Infosecurity Magazine Read More »

New Grandoreiro Malware Variant Targets Spain - Infosecurity Magazine

New Grandoreiro Malware Variant Targets Spain – Infosecurity Magazine

Cybersecurity experts at Proofpoint have identified a new variant of the Grandoreiro malware, previously known for targeting victims in Brazil and Mexico. This latest version of Grandoreiro, attributed to the threat actor TA2725, has expanded its reach to target banks in Spain as well.  Writing in an advisory published today, the researchers said they recently

New Grandoreiro Malware Variant Targets Spain – Infosecurity Magazine Read More »

House cybersecurity subcommittee chairman says GOP speaker drama is impacting cyber legislation

House cybersecurity subcommittee chairman says GOP speaker drama is impacting cyber legislation

House Republicans’ chaotic search for a new speaker is stymieing lawmakers’ work on ensuring that the Cybersecurity and Infrastructure Security Agency is properly funded, the chairman of the chamber’s Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection said Thursday. Speaking on the sidelines of a panel hosted by Punchbowl News, Rep. Andrew Garbarino, R-N.Y., told

House cybersecurity subcommittee chairman says GOP speaker drama is impacting cyber legislation Read More »

Cybersecurity 101: Everything on how to protect your privacy and stay safe online

Cybersecurity 101: Everything on how to protect your privacy and stay safe online

“I have nothing to hide” was once a typical response to surveillance programs utilizing cameras, border checks, and questioning by law enforcement. But now, the sheer volume of devices and technology-based “innovations” used to track us has changed the conversation. Every piece of technology in our lives — from internet browsers and mobile devices to

Cybersecurity 101: Everything on how to protect your privacy and stay safe online Read More »

Australia’s home affairs department hit by DDoS attack claimed by pro-Russia hackers | Australia news | The Guardian

Australia’s home affairs department hit by DDoS attack claimed by pro-Russia hackers | Australia news | The Guardian

The department responsible for Australia’s cybersecurity, national security and immigration has confirmed it was hit with a distributed denial-of-service attack on Thursday night that took its website offline for five hours, after a pro-Russia hacker group said it would target the site over Australia’s support for Ukraine. The group posted on Telegram on Thursday night

Australia’s home affairs department hit by DDoS attack claimed by pro-Russia hackers | Australia news | The Guardian Read More »

Android will now scan sideloaded apps for malware at install time

Android will now scan sideloaded apps for malware at install time

Enlarge / Google’s new malware scanner for sideloaded apps. (credit: Google) The Google Play Store might not be perfect for stopping Android malware, but its collection of scanning, app reviews, and developer requirements makes it a lot safer than the wider, unfiltered Internet. The world outside Google’s walled garden has no rules at all and

Android will now scan sideloaded apps for malware at install time Read More »

Fake Browser Updates Used in Malware Distribution - Infosecurity Magazine

Fake Browser Updates Used in Malware Distribution – Infosecurity Magazine

Cybersecurity researchers from Proofpoint have identified a rising trend in threat activity that employs fake browser updates to disseminate malware.  At least four distinct threat clusters have been tracked utilizing this deceptive tactic. Fake browser updates are compromised websites that display fake notifications mimicking popular browsers like Chrome, Firefox or Edge, luring users into downloading

Fake Browser Updates Used in Malware Distribution – Infosecurity Magazine Read More »

Regulations are still necessary to compel adoption of cybersecurity measures

Regulations are still necessary to compel adoption of cybersecurity measures

Regulations are still necessary to make sure organizations are compelled to adopt measures designed to strengthen their cybersecurity posture. Singapore this week released guides it said will help organizations, including small- and mid-sized businesses (SMBs), better understand risks associated with using cloud services and what they, as well as their cloud providers, need to do

Regulations are still necessary to compel adoption of cybersecurity measures Read More »

ToddyCat hackers use 'disposable' malware to target Asian telecoms

ToddyCat hackers use ‘disposable’ malware to target Asian telecoms

A newly discovered campaign dubbed “Stayin’ Alive” has been targeting government organizations and telecommunication service providers across Asia since 2021, using a wide variety of “disposable” malware to evade detection. Most of the campaign’s targets seen by cybersecurity firm Check Point are based in Kazakhstan, Uzbekistan, Pakistan, and Vietnam, while the campaign is still underway.

ToddyCat hackers use ‘disposable’ malware to target Asian telecoms Read More »

6 simple cybersecurity rules you can apply now

If you’re an IT pro or a serious PC hobbyist, computers are as logical as Mr. Spock. If you’re a human being without a technical background, the average Windows error message might as well be written in Klingon. For that latter audience, computer security often devolves into magical thinking. That’s unfortunate because the reality is

6 simple cybersecurity rules you can apply now Read More »

Scroll to Top