Novel Phishing Trick Uses Weird Links to Bypass Spam Filters
A novel form of phishing takes advantage of a disparity between how browsers and email inboxes read web domains. [...]
A novel form of phishing takes advantage of a disparity between how browsers and email inboxes read web domains. [...]
Why a private college that stayed in business for 157 years had to close after the combo of COVID-19 and ransomware proved too much. [...]
Researchers say a hacker is selling access to quality malware for chump change. [...]
A state-sponsored threat actor designed a house-of-cards style infection chain to exfiltrate massive troves of highly sensitive data. [...]
A sophisticated campaign utilizes a novel anti-detection method. [...]
Mustang Panda's already sophisticated cyberespionage campaign has matured even further with the introduction of a brand-new PlugX RAT variant. [...]
Attackers are hiding interesting malware in a boring place, hoping victims won’t bother to look. [...]
After years of promising a passwordless future – really, any day now! – FIDO is proposing tweaks to WebAuthn that could put us out of password misery. Experts aren’t so sure. [...]
A ransomware attack struck Bridgestone Americas, weeks after another Toyota supplier experienced the same and a third reported some kind of cyber hit. [...]
They’re choosing sides in the Russia-Ukraine war, beckoning previously shunned ransomware groups and thereby reinvigorating those groups' once-diminished power. [...]
A new survey suggests that security is becoming more important for enterprises, but they’re still falling back on old "security by obscurity" ways. [...]
Customers aren't locking down access correctly, leading to ~70 percent of ServiceNow implementations tested by AppOmni being vulnerable to malicious data extraction. [...]
A missing check allows unprivileged attackers to escape containers and execute arbitrary commands in the kernel. [...]
Researchers have discovered how to remotely manipulate the Amazon Echo through its own speakers. [...]
A military email address was used to distribute malicious email macros among EU personnel helping Ukrainians. [...]
Malicious Google Play apps have circumvented censorship by hiding trojans in software updates. [...]
The infamous trojan is likely making some major operational changes, researchers believe. [...]
A targeted phishing attack takes aim at a major U.S. payments company. [...]
Attackers are sending email blasts with malware links in embedded PDFs as a way to evade email filters, lying about having fictional "video evidence." [...]
Attackers took advantage of a smart-contract migration to swindle 17 users. [...]
An oversight in a WordPress plug-in exposes PII and authentication data to malicious insiders. [...]
On Tuesday, institutions central to Ukraine’s military and economy were hit with denial-of-service (DoS) attacks. Impact was limited, but the ramifications are not. [...]