7/26/2022

U.S. Doubles Reward for Tips on North Korean-Backed Hackers

How Big Is the Risk That Someone Will Hack an EV Charging Network?

Phishing Attacks Skyrocket with Microsoft and Facebook as Most Abused Brands

LinkedIn Phishing Target Employees Managing Facebook Ad Accounts

‘Ducktail’

Poor Training and Communications Hindering Cybersecurity Efforts

Experts Find Similarities Between New LockBit 3.0 and BlackMatter Ransomware

LockBit Claims Attack on Italian Tax Agency

No More Ransom Helps Millions of Ransomware Victims in 6 Years

Crypto Exchange Kraken Reportedly Hunted by the Feds for Alleged Sanctions Busting

Senate Panel Turns to Kids’ Online Safety

NPM Users Can Now Connect a Twitter Account as a Recovery Method
Hackers Steal $6 Million From Blockchain Music Platform Audius

New Android Malware Apps Installed 10 Million Times From Google Play

Arhaus (OH) Confirms Data Breach Affecting Employee Information

Luca Stealer Malware Spreads Rapidly After Code Handily Appears on Github

Hackers Increasingly Using WebAssembly Coded Cryptominers to Evade Detection

Cosmicstrand UEFI Malware Found in Gigabyte, ASUS Motherboards

Microsoft: IIS Extensions Increasingly Used as Exchange Backdoors

Discord, Telegram Services Hijacked to Launch Array of Cyberattacks

Critical FileWave MDM Flaws Open Organization-Managed Devices to Remote Hackers

Critical Vulnerabilities Exposed Nuki Smart Locks to a Plethora of Attack Options

Hackers Scan for Vulnerabilities Within 15 Minutes of Disclosure

Leave a Reply