Chinese Hackers May Be Behind Attacks Targeting Eastern Europe and Afghanistan

Chinese Hackers May Be Behind Attacks Targeting Eastern Europe and Afghanistan

A new analysis by Kaspersky unveiled a wave of targeted attacks on military-industrial complex enterprises and public institutions in Belarus, Russia, Ukraine and Afghanistan. The cybersecurity company made the announcement in an advisory published on Monday, which claims the attackers were able to penetrate several enterprises and hijack the IT infrastructure of some of them. Kaspersky did not name these entities but said they included industrial plants, design bureaus and research institutes, government agencies, ministries…

Read More

How employee upskilling can ease the cyber talent shortage

How employee upskilling can ease the cyber talent shortage

How employee upskilling can ease the cyber talent shortage | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

The top identity-based attacks and how to stop them: Part 1

The top identity-based attacks and how to stop them: Part 1

The top identity-based attacks and how to stop them: Part 1 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

The top identity-based attacks and how to stop them

The top identity-based attacks and how to stop them: Part 1

The top identity-based attacks and how to stop them | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Hackers Exploit Open Redirect Vulnerabilities to Conduct LogoKit Phishing Campaigns

Hackers Exploit Open Redirect Vulnerabilities to Conduct LogoKit Phishing Campaigns

Threat actors (TA) leveraged Open Redirect Vulnerabilities in online services and apps to bypass spam filters and deliver phishing content, according to new data from cybersecurity researchers Resecurity. In particular, the TA would have used highly trusted service domains like Snapchat and other online services to create special URLs that then lead to malicious resources with phishing kits. Resecurity said the tools used as part of these attacks were part of LogoKit, which was previously…

Read More

CIO Leadership Live with Chris Locke, CIO, Flight Centre

CIO Leadership Live with Chris Locke, CIO, Flight Centre

Australian travel agency group, Flight Centre, lost close to $1.2 billion during COVID. During the height of the pandemic, 160 technology staff lost their jobs as the Australian business shifted from a $103 million monthly cost base down to $30 million.  In this episode of CIO Leadership Live Australia, Flight Centre’s chief information officer, Chris Locke, discusses how his tech team is doing more with less, as well as the technology initiatives that are helping…

Read More

Why Physical Security Should Be Part of a Cybersecurity Strategy

Why Physical Security Should Be Part of a Cybersecurity Strategy

By David Weingot, Founder and CEO, DMAC Security Our modern world is full of various types of physical and cyber-related threats. The war in Ukraine is ramping up Russian attacks on American targets, and the talk of a cyberattack is not out of the realm of possibility. It is essential for businesses to be prepared for any kind of attack, and that includes a combination of both physical and cybersecurity. As the Cybersecurity and Infrastructure…

Read More

The metaverse faces more than 8 potential cyberthreats

The metaverse faces more than 8 potential cyberthreats

As technologies, hardware and infrastructure mature, metaverse-like apps will converge and with that comes the potential for cyberthreats, a new report from Trend Micro finds. Image: Adobe Stock The metaverse is comprised of new and emerging technologies including augmented/virtual/mixed/extended reality, IoT, AI and machine learning and distributed ledger technology. There are some metaverse-like applications already, mainly for gamers. Still, over the next three-to-five years, more metaverse-like applications are expected that will be used for remote…

Read More

Deepfake attacks and cyber extortion are creating mounting risks

Deepfake attacks and cyber extortion are creating mounting risks

Email is the top delivery method used by cybercriminals deploying geopolitically-motivated attacks to try and move laterally inside networks, a new VMware report finds. Image: Adobe Stock Sixty-five percent of defenders report that cyberattacks have increased since Russia invaded Ukraine, according to VMware’s eighth annual Global Incident Response Threat Report released at Black Hat USA 2022. Must-read security coverage In February, for instance, VMware reported seeing a new type of malware (coined HermeticWiper) deployed in…

Read More

North Korean Hackers Target Crypto Job Seekers

North Korean Hackers Target Crypto Job Seekers

Suspected North Korea state hackers are targeting cryptocurrency workers with a new phishing campaign. Malwarebytes threat intelligence researcher, Hossein Jazi, posted details of the campaign to Twitter. It appears to leverage a PDF containing details of the non-existent role of “engineering manager, product security” at crypto giant Coinbase. In fact, the file is hiding a malicious executable which will infect the victim’s machine. This isn’t the first time that actors from the notorious Lazarus Group…

Read More
1 2,794 2,795 2,796 2,797 2,798 4,090