Prison for BEC Scheme Money Launderer

Prison for BEC Scheme Money Launderer

An Ontario resident, who admitted laundering tens of millions of dollars stolen by cyber-criminals in various wire and bank fraud schemes, is to spend the next 140 months in a United States federal prison. Dual Canadian and United States citizen Ghaleb Alaumary, formerly of Mississauga, was sentenced yesterday after pleading guilty to two counts of conspiracy to commit money laundering. He was further ordered to pay $30m in restitution to his victims and to serve three years of supervised…

Read More

Cyber-criminal Targets Dadsnet Founders

Cyber-criminal Targets Dadsnet Founders

A hacker who calls themself “The King” is demanding more than $40,000 to return control of a social media account to its rightful owners.  The access being held to ransom relates to an Instagram account belonging to 33-year-old Al Ferguson and his 43-year-old wife, Jen, who together founded a parenting forum geared toward fathers, Dadsnet.  For more than seven years, the entrepreneurial British couple have shared personal details of their lives with tens of thousands of their…

Read More

The top keywords used in phishing email subject lines

The top keywords used in phishing email subject lines

Some of these phrasings are standard day-to-day subject lines, but as one expert explained, “the attacker wants you to be moving too fast to stop and question if it’s legitimate.” Image: GettyImages/Maskot In recent months, hacking groups have brought critical aspects of U.S. infrastructure to a halt, and phishing is a popular tool in cybercriminal’s seemingly ever-expanding armamentarium of attack methods. On Wednesday, Expel released a report, highlighting the top keywords used in phishing attempt…

Read More

Hackers Steal Data from United Nations

Hackers Steal Data from United Nations

Hackers have broken into the computer network of the United Nations and made off with data, according to researchers at cybersecurity firm Resecurity.  Bloomberg reports that the unidentified cyber-criminals behind the theft appear to have gained access simply by using login credentials stolen from a UN employee.  Entry was gained by logging in to the employee’s Umoja account. Umoja, which means “unity” in Kiswahili, is the enterprise resource planning system implemented by the UN in 2015. It…

Read More

Deploying VMware Clouds in Multiple Clouds – Cloud Blog – VMware

Deploying VMware Clouds in Multiple Clouds – Cloud Blog – VMware

As VMware forges partnership with our Public Cloud Provider Partners (also known as Hyperscale partners), our customers now have choice and flexibility to choose the appropriate Public Cloud Providers, in their preferred geographic region, to build, manage, automate, secure and operate their VMware based workloads. In this article, we’ll demonstrate how easy it is to deploy VMware Clouds (aka Software Defined Data Centers or Private Clouds) in Multiple Cloud Provider Partner environments. For the purpose…

Read More

The Magic Behind the Scenes of Docker Desktop – Docker Blog

The Magic Behind the Scenes of Docker Desktop – Docker Blog

With all the changes recently quite a few people have been talking about Docker Desktop and trying to understand what it actually does on your machine. A few people have asked, “is it just a container UI?”  Great developer tools are magic for new developers and save experienced developers a ton of time. This is what we set out to do with Docker Desktop. Docker Desktop is designed to let you build, share and run containers…

Read More

SPDX becomes internationally recognized standard

SPDX becomes internationally recognized standard

In use for a decade as the de facto standard for communicating software bills of materials, SPDX formally becomes the internationally recognized ISO/IEC JTC 1 standard. Image: Kheng Guan Toh/Shutterstock The Linux Foundation announced Thursday the Software Package Data Exchange (SPDX) specification has been published as ISO/IEC 5962:2021 and recognized as the open standard for security, license compliance and other software supply chain artifacts.  Software bills of materials are used to communicate information in policies…

Read More

Stop using your web browser security wrong

Stop using your web browser security wrong

Chances are good you’re not using your browser with a strong enough eye on security. Jack Wallen offers up some advice to the average user on how to browse safer. Image: Sergey Nivens/Shutterstock For the love of privacy and security, stop! You’re using the default settings in your web browser, thereby assuming the companies that created the software either know what’s best for you or don’t have ulterior motives for how they set security options…

Read More

Malicious office documents: The latest trend in cybercriminal exploitation

Malicious office documents: The latest trend in cybercriminal exploitation

Cyberattacks have surged during the coronavirus pandemic as criminals rake in bountiful ransomware payouts. Malicious office docs have been on the rise for months, per a new report. Image: GettyIMages/South_agency Cyberattacks have increased over the last year as criminals rake in record ransomware payouts. According to a recent AtlasVPN report, malicious office documents are the latest trend in cybercriminal behavior; a timely strategy as companies pause office reentry plans and continue to work remotely due…

Read More

How MVISION CNAPP Helps Protect Against ChaosDB

How MVISION CNAPP Helps Protect Against ChaosDB

Attackers have made it known that Microsoft is clearly in their cross hairs when it comes to potential targets. Just last month the US Justice Department disclosed that Solorigate continues to comprise security when they confirmed over 80% of Microsoft email accounts were breached across four different federal prosecutors offices. In August Microsoft released another security patch (the second of two) for PrintNightmare, which allows remote attackers system level escalation of all Windows clients and…

Read More
1 2,111 2,112 2,113 2,114 2,115 2,600