22 Jan Post Grid
Posted at 21:54h in Uncategorized
Spyware app exposes private photos, hosting provider steps in
A hosting company took down a database operated by a spying app this week after it was found displaying thousandsRead more.
Microsoft Sees 250% Phishing Increase, Malware Decline by 34%
Phishing attacks have seen an impressive 250% increase between January and December 2018, with attackers moving to multiple points ofRead more.
Ransomware out, formjacking in as primary attack vectors
Quick and easy attack methods like formjacking gained popularity among cybercriminals last year, while more tried and true approaches likeRead more.
New Offensive USB Cable Allows Remote Attacks over WiFi
Like a scene from a James Bond or Mission Impossible movie, a new offensive USB cable plugged into a computerRead more.
Hacker group uses Google Translate to hide phishing sites
Cyber-criminal groups are using Google Translate to hide the real domain of their phishing sites, security researchers have discovered. PhishingRead more.
The Evolution of Cyber Defenses, Attacks and Vulnerabilities in 2019
Time marches forward—and so does cybersecurity and the cyber threat landscape. What do organizations and IT professionals have to lookRead more.
The Biggest Cybercrime Threats of 2019
A new year means a fresh start, but it doesn’t mean that old threats will go away. In fact, inRead more.
60 Percent of Organizations Experienced Container Security Incidents in 2018
A new study has revealed that 60 percent of respondents reported their organizations have experienced container security incidents in theRead more.
Next Generation Tools: Deception Networks
There have been several predictions as to where adversary hacking is headed in the foreseeable future. Virtually all credible predictionsRead more.
Hacker forces thousands of printers to churn out PewDiePie support message
For the second time in less than three weeks, a hacker has forced thousands of internet-connected printers to spit outRead more.
Blockchain alliance aims to track carbon credits to fight climate change
Carbon credits are a common mechanism used to help cut carbon dioxide emissions that fuel climate change, and now there’sRead more.
Latest Google+ flaw leads Chocolate Factory to shut down site early
52.5 million accounts at risk, tens of people are worried Google says it will be speeding up the dismantling ofRead more.
Kubernetes Flaw is a “Huge Deal,” Lays Open Cloud Deployments
A critical privilege-escalation vulnerability (CVE-2018-1002105) has been uncovered in the Kubernetes open-source container software, which is a fixture in muchRead more.
Global Ransomware Damage Costs Predicted To Reach $20 Billion (USD) By 2021
Ransomware is expected to attack a business every 11 seconds by the end of 2021 Ransomware — a malware that infectsRead more.
Majority of Cybercrime Damage is Caused by a Few, Powerful, Covert Criminal Threat Groups
A small subset of professional criminal actors is responsible for the bulk of cybercrime-related damage, employing tools and techniques asRead more.
21 Terrifying Cyber Crime Statistics
It may not be a nice topic to talk about, but it is essential that the world is aware ofRead more.