News & Updates

De sărbători, dăruiește-ți dragostea, nu parolele

În toată agitația de sărbători, este ușor să uiți de măsurile de protecție
online. Gândește-te că parolele sunt precum ușa casei tale; nu ai vrea să intre
vreun musafir nepoftit, așa că închide-o bine.

În perioada sărbătorilor, incidența cazurilor de intrare prin efracție este mai
mare, la fel de mare fiind și numărul cazurilor de accesare neautorizată a
conturilor. Hackerii folosesc tehnici diferite pentru a profita de o parolă
slabă: atacuri de tip brute force (programe care ghicesc combinați

News & Updates

Riscurile utilizării mai intense a aplicațiilor mobile în perioada sărbătorilor

Activitatea online se intensifică în perioada sărbătorilor de iarnă și, când
vine vorba de securitatea cibernetică, acest lucru poate însemna un singur
lucru: riscuri sporite care pot pune capăt planurilor tale de sărbători sau de
călătorie.

Unul dintre aceste riscuri derivă din schimbările în comportamentele
utilizatorilor, în special utilizarea mai intensă a dispozitivelor mobile și
aplicațiilor noi, cum ar fi:

* Aplicațiile de cashback/cupoane, aplicații ale retailerilor sau de călătorii,

News & Updates

Phobos Ransomware Aggressively Targeting U.S. Critical Infrastructure

U.S. cybersecurity and intelligence agencies have warned of Phobos ransomware attacks targeting government and critical infrastructure entities, outlining the various tactics and techniques the threat actors have adopted to deploy the file-encrypting malware.
“Structured as a ransomware as a service (RaaS) model, Phobos ransomware actors have targeted entities including municipal and
News & Updates

U.S. Court Orders NSO Group to Hand Over Pegasus Spyware Code to WhatsApp

A U.S. judge has ordered NSO Group to hand over its source code for Pegasus and other remote access trojans to Meta as part of the social media giant’s ongoing litigation against the Israeli spyware vendor.
The decision marks a major legal victory for Meta, which filed the lawsuit in October 2019 for using its infrastructure to distribute the spyware to
News & Updates

U.S. Charges Iranian Hacker, Offers $10 Million Reward for Capture

The U.S. Department of Justice (DoJ) on Friday unsealed an indictment against an Iranian national for his alleged involvement in a multi-year cyber-enabled campaign designed to compromise U.S. governmental and private entities.
More than a dozen entities are said to have been targeted, including the U.S. Departments of the Treasury and State, defense contractors that support U.S. Department of
News & Updates

New Phishing Kit Leverages SMS, Voice Calls to Target Cryptocurrency Users

A novel phishing kit has been observed impersonating the login pages of well-known cryptocurrency services as part of an attack cluster codenamed CryptoChameleon that’s designed to primarily target mobile devices.
“This kit enables attackers to build carbon copies of single sign-on (SSO) pages, then use a combination of email, SMS, and voice phishing to trick the target into sharing
News & Updates

4 Instructive Postmortems on Data Downtime and Loss

More than a decade ago, the concept of the ‘blameless’ postmortem changed how tech companies recognize failures at scale.
John Allspaw, who coined the term during his tenure at Etsy, argued postmortems were all about controlling our natural reaction to an incident, which is to point fingers: “One option is to assume the single cause is incompetence and scream at engineers to make them
News & Updates

New BIFROSE Linux Malware Variant Using Deceptive VMware Domain for Evasion

Cybersecurity researchers have discovered a new Linux variant of a remote access trojan (RAT) called BIFROSE (aka Bifrost) that uses a deceptive domain mimicking VMware.
“This latest version of Bifrost aims to bypass security measures and compromise targeted systems,” Palo Alto Networks Unit 42 researchers Anmol Maurya and Siddharth Sharma said.
BIFROSE is one of the long-standing
News & Updates

Five Eyes Agencies Warn of Active Exploitation of Ivanti Gateway Vulnerabilities

The Five Eyes (FVEY) intelligence alliance has issued a new cybersecurity advisory warning of cyber threat actors exploiting known security flaws in Ivanti Connect Secure and Ivanti Policy Secure gateways, noting that the Integrity Checker Tool (ICT) can be deceived to provide a false sense of security.
“Ivanti ICT is not sufficient to detect compromise and that a cyber threat actor may be able
News & Updates

GitHub Rolls Out Default Secret Scanning Push Protection for Public Repositories

GitHub on Thursday announced that it’s enabling secret scanning push protection by default for all pushes to public repositories.
“This means that when a supported secret is detected in any push to a public repository, you will have the option to remove the secret from your commits or, if you deem the secret safe, bypass the block,” Eric Tooley and Courtney Claessens said.
Push protection&
Exit mobile version