News & Updates

Scam Alert: Fake Battlefield 6 Beta Ads Are Stealing Steam Credentials

Note: All product and company names mentioned herein are for identification purposes only and are the property of, and may be trademarks of, their respective owners.

A new phishing campaign is sweeping through Meta platforms (Facebook and Instagram), targeting gamers excited about the leaked Battlefield 6 beta. Launched in the wake of gameplay and release rumors on July 28, the scam uses fake ads to lure victims into handing over their Steam login credentials via a fraudulent login page.

The

News & Updates

Feds Confiscate Millions in Bitcoin from Emerging Ransomware Group

The FBI has announced the seizure of over $1.7 million worth of crypto from an affiliate of the emerging Chaos ransomware group.

The agency confiscated 20.28 BTC in proceeds linked to a ransomware operator known as “Hors,” according to the FBI’s Dallas Field Office. The seizure took place April 15 and was formally recorded July 24 via a civil forfeiture complaint from the US Department of Justice.

“The seized funds were traced to a cryptocurrency address allegedly associated with a member of t

News & Updates

Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks

The threat actor linked to the exploitation of the recently disclosed security flaws in Microsoft SharePoint Server is using a bespoke command-and-control (C2) framework called AK47 C2 (also spelled ak47c2) in its operations.
The framework includes at least two different types of clients, HTTP-based and Domain Name System (DNS)-based, which have been dubbed AK47HTTP and AK47DNS, respectively, by
News & Updates

CISA released Thorium platform to support malware and forensic analysis

CISA releases Thorium, an open-source tool for malware and forensic analysis, now available to analysts in government, public, and private sectors. CISA has released Thorium, a new open-source platform designed to support malware and forensic analysis. The platform was designed in collaboration with Sandia National Laboratories, the US Agency presented it as a scalable, open-source platform […]
Cybersecurity Tools

The Six Data Processing Principles of the UK GDPR Explained

Article 5 of the UK GDPR (General Data Protection Regulation) sets out six key data processing principles – sometimes informally referred to as data protection principles. These underpin all personal data processing and serve as a practical framework for ensuring compliance. This blog post outlines each of the six principles, explains how they apply in practice and offers guidance on how to demonstrate compliance. What are the GDPR data processing principles? Lawfulness, fairness and transparency Organisations must process personal data in a way that is: These obligations require you to think about how you collect data, what individuals are told

The post The Six Data Processing Principles of the UK GDPR Explained appeared first on IT Governance Blog.

Scroll to Top