Cybersecurity Tools

Google Fined for YouTube Child Privacy Violation

In 2019, the U.S. Federal Trade Commission (FTC) fined Google a record-breaking $170 million for violating the Children’s Online Privacy Protection Act (COPPA) on YouTube. The FTC alleged that Google collected personal information from children under 13 without parental consent, including viewing histories, device identifiers, and location data. This information was then used to serve […]

The post Google Fined for YouTube Child Privacy Violation appeared first on SecureBlitz Cybersecurity.

Cybersecurity Tools

Browser Compartmentalization: How To Compartmentalize Your Web Browsers

Are you considering browser compartmentalization? Here, we will show you how to compartmentalize your web browsers and practical examples. Do you know that you are tracked on the internet? Yes, you are. When you visit websites, some collect your browsing cookies, track your location, and even collect your fingerprint. Some browsers do have robust privacy […]

The post Browser Compartmentalization: How To Compartmentalize Your Web Browsers appeared first on SecureBlitz Cybersecurity.

Threats

Knight Ransomware Detection: 3.0 Ransomware Source Code Available for Sale

Knight Ransomware Detection

The source code for Knight ransomware, a rebrand of Cyclops RaaS operation, is available for sale on a hacking forum. Researchers revealed a recent advertisement posted on the RAMP forum by an individual threat actor under the moniker Cyclops who belongs to the Knight ransomware gang. The source code for Knight ransomware version 3.0 is […]

The post Knight Ransomware Detection: 3.0 Ransomware Source Code Available for Sale appeared first on SOC Prime.

Cybersecurity Tools

Astaroth malware uses YouTube channel descriptions for hacks

In 2020, the digital landscape witnessed a cunning maneuver by the infamous Astaroth malware. This infostealing Trojan, notorious for targeting Brazilian users, adopted a novel tactic to evade detection and compromise unsuspecting victims: hiding its malicious code within YouTube channel descriptions. Cisco Talos researchers first uncovered this devious strategy, revealing that Astaroth embedded encrypted and […]

The post Astaroth malware uses YouTube channel descriptions for hacks appeared first on SecureBlitz Cybersecurity.

Cybersecurity Tools

The Week in Cyber Security and Data Privacy: 12 – 18 February 2024

402,437,094 known records breached in 240 publicly disclosed incidents Welcome to this week’s global round-up of the biggest and most interesting news stories. At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks.  Publicly disclosed data breaches and cyber attacks: in the spotlight Unsecured Zenlayer database exposes over 380 million records The cyber security researcher Jeremiah Fowler has discovered an unprotected database that exposed over 380 million data records, including customer information and internal data relating to the network services

The post The Week in Cyber Security and Data Privacy: 12 – 18 February 2024 appeared first on IT Governance UK Blog.

Cybersecurity Tools

Ashley Brett on Cyber Essentials Solutions

Finding the right solution for you, with help from our cyber security advisor Ashley is an experienced cyber security advisor for IT Governance, who has carried out hundreds of Cyber Essentials Plus assessments. He also provides Cyber Essentials consultancy, helping customers become compliant. Ashley is also a product evangelist for IT Governance, creating and sharing interesting content related to Cyber Essentials on social media. We sat down to chat to him about the scheme, and which Cyber Essentials solutions are best for which organisation. Let’s start with the basics: what is Cyber Essentials? Cyber Essentials is a government-backed scheme intended

The post Ashley Brett on Cyber Essentials Solutions appeared first on IT Governance UK Blog.

Scroll to Top