Cybersecurity Tools

New Year, New Consumer Demands in Cybersecurity: Navigating the Landscape of Consumer Expectations and App Developer Responsibility in Mobile App Security

By Alan Bavosa, VP of Security Products, Appdome The significant growth and mass adoption of mobile applications has completely transformed the way users engage with brands today. From managing finances […]

The post New Year, New Consumer Demands in Cybersecurity: Navigating the Landscape of Consumer Expectations and App Developer Responsibility in Mobile App Security appeared first on Cyber Defense Magazine.

Cybersecurity Tools

Addressing The Cybersecurity Risks Presented By Remote Learning

This post will address the cybersecurity risks associated with remote learning. The swift pivot to remote learning has cast light on an array of cybersecurity risks, threatening our educational landscape with increased cyber attacks and data breaches. With everything from identity theft to denial of service attacks jeopardizing elearning security, it’s clear that safeguarding our […]

The post Addressing The Cybersecurity Risks Presented By Remote Learning appeared first on SecureBlitz Cybersecurity.

Cybersecurity Tools

Google Fined for YouTube Child Privacy Violation

In 2019, the U.S. Federal Trade Commission (FTC) fined Google a record-breaking $170 million for violating the Children’s Online Privacy Protection Act (COPPA) on YouTube. The FTC alleged that Google collected personal information from children under 13 without parental consent, including viewing histories, device identifiers, and location data. This information was then used to serve […]

The post Google Fined for YouTube Child Privacy Violation appeared first on SecureBlitz Cybersecurity.

Cybersecurity Tools

Browser Compartmentalization: How To Compartmentalize Your Web Browsers

Are you considering browser compartmentalization? Here, we will show you how to compartmentalize your web browsers and practical examples. Do you know that you are tracked on the internet? Yes, you are. When you visit websites, some collect your browsing cookies, track your location, and even collect your fingerprint. Some browsers do have robust privacy […]

The post Browser Compartmentalization: How To Compartmentalize Your Web Browsers appeared first on SecureBlitz Cybersecurity.

Threats

Knight Ransomware Detection: 3.0 Ransomware Source Code Available for Sale

The source code for Knight ransomware, a rebrand of Cyclops RaaS operation, is available for sale on a hacking forum. Researchers revealed a recent advertisement posted on the RAMP forum by an individual threat actor under the moniker Cyclops who belongs to the Knight ransomware gang. The source code for Knight ransomware version 3.0 is […]

The post Knight Ransomware Detection: 3.0 Ransomware Source Code Available for Sale appeared first on SOC Prime.

Cybersecurity Tools

Astaroth malware uses YouTube channel descriptions for hacks

In 2020, the digital landscape witnessed a cunning maneuver by the infamous Astaroth malware. This infostealing Trojan, notorious for targeting Brazilian users, adopted a novel tactic to evade detection and compromise unsuspecting victims: hiding its malicious code within YouTube channel descriptions. Cisco Talos researchers first uncovered this devious strategy, revealing that Astaroth embedded encrypted and […]

The post Astaroth malware uses YouTube channel descriptions for hacks appeared first on SecureBlitz Cybersecurity.

Cybersecurity Tools

The Week in Cyber Security and Data Privacy: 12 – 18 February 2024

402,437,094 known records breached in 240 publicly disclosed incidents Welcome to this week’s global round-up of the biggest and most interesting news stories. At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks.  Publicly disclosed data breaches and cyber attacks: in the spotlight Unsecured Zenlayer database exposes over 380 million records The cyber security researcher Jeremiah Fowler has discovered an unprotected database that exposed over 380 million data records, including customer information and internal data relating to the network services

The post The Week in Cyber Security and Data Privacy: 12 – 18 February 2024 appeared first on IT Governance UK Blog.

Exit mobile version