NordVPN puts the price tag of stolen streaming subscriptions at $38 million

NordVPN puts the price tag of stolen streaming subscriptions at  million

Malware designed to steal log-in information saved in browsers has infected 16 million computers and swiped credentials for up to 174,800 accounts. Image: iStockphoto/ArtHead- It can be annoying when a family member or friend changes a Netflix password on the account that you’ve been sharing with them. That can be fixed (usually) with a call or text to get the new password. The solution is not so easy if a cybercriminal has stolen the account…

Read More

Why it’s Best to Stick to Sharing Chocolates and Flowers this Valentine’s Day | McAfee Blogs

Why it’s Best to Stick to Sharing Chocolates and Flowers this Valentine’s Day | McAfee Blogs

Valentine’s Day is nearly upon us – and as couples and singletons alike gear up for a day that’s traditionally all about sharing, when it comes to our digital identities, might we be sharing too much, and how can we protect ourselves? With data showing that past, present and possibly even future lovers are willing to secretly snoop on your online information to find out all about you, it’s safe to say that ill-intentioned online…

Read More

Love is in the air—and cybercriminals are taking advantage

Love is in the air—and cybercriminals are taking advantage

Malicious Valentine’s Day-themed phishing campaigns are up 29% from last year, according to Check Point Research. Valentine’s Day-themed phishing campaigns are up 29% from last year, according to Check Point Research. Image: Check Point Research Love may be blind, but cybercriminals are not. Over 400 malicious Valentine’s Day-themed phishing individual email campaigns were spotted on a weekly basis in January, according to Check Point Research. There was also a 29% year-over-year increase in Valentine’s Day-themed…

Read More

Probable Iranian Cyber Actors, Static Kitten, Conducting Cyberespionage Campaign Targeting UAE and Kuwait Government Agencies

Probable Iranian Cyber Actors, Static Kitten, Conducting Cyberespionage Campaign Targeting UAE and Kuwait Government Agencies

ScreenConnect Remote Access Tool Utilizing Ministry of Foreign Affairs-Themed EXEs and URLs Authored by: Gage Mele, Winston Marydasan, and Yury Polozov Key Findings Anomali Threat Research identified a campaign targeting government agencies in the United Arab Emirates (UAE) and likely the broader Middle East. We assess that Iran-nexus cyberespionage group Static Kitten, due to Israeli geopolitical-themed lures, Ministry of Foreign Affairs (MOFA) references, and the use of file-storage service Onehub that was attributed to their…

Read More

Researcher Hacks Apple and Microsoft

Researcher Hacks Apple and Microsoft

A researcher claims to have hacked into the internal systems of major companies including Apple and Microsoft using a novel supply chain attack.  Alex Biran created malicious node packages and uploaded them to the npm registry under unclaimed names. The node packages collected information through their preinstall script about the machines upon which they were installed.  Next, Biran came up with a way to get the packages to send information back to him.  “Knowing that most of…

Read More

Hacker Admits Stealing College Girls’ Nude Snaps

Hacker Admits Stealing College Girls’ Nude Snaps

A man from New York has admitted hacking into the social media accounts of female college students and stealing intimate photographs to trade online. Over a two-year period, Rochester resident Nicholas Faber compromised the accounts of dozens of women attending State University of New York (SUNY) Plattsburgh to access videos and images in which his victims appeared in a state of undress.  The 25-year-old did not commit his crimes alone. Faber admitted working with co-conspirator Michael…

Read More

Tenable annonce son intention d’acquérir Alsid

Tenable annonce son intention d’acquérir Alsid

Tenable® Holdings, Inc. (« Tenable ») (Nasdaq : TENB), la société de Cyber Exposure, annonce être en phase finale d’un accord pour l’acquisition de l’entreprise Alsid SAS (« Alsid »), leader du marché de la sécurité Active Directory (AD). Alsid pour Active Directory est une solution SaaS (Software as a Service) avec une option de déploiement sur site qui surveille la sécurité des systèmes Active Directory en temps réel. La solution permet aux utilisateurs d’identifier et de corriger les vulnérabilités…

Read More

Paving the way: Inspiring Women in Payments – A podcast featuring Angel Grant

Paving the way: Inspiring Women in Payments – A podcast featuring Angel Grant

  When she’s not perfecting her lock-picking skills, Angel Grant is busy building a diverse team who have the right attributes for the dynamic world of technology. In this edition of our podcast series, Angel explains that since your future job probably doesn’t exist yet, the keys to success are your transferrable skills.

Read More

Identity Verification Firm Veriff Appoints Amish Mody as New CFO

Identity Verification Firm Veriff Appoints Amish Mody as New CFO

Estonia-based online identity verification company Veriff has announced the appointment of Amish Mody as its new chief financial officer (CFO). Mody joins Veriff from FinTech firm Monese, where he served as VP of finance for five years, overseeing the company’s development from pre-launch to a headcount of several hundred, with operations in four countries. At Veriff, Mody will head the financial planning, accounting, business intelligence and other finance-related matters of the organization. “I am really…

Read More

Tenable Announces Intent to Acquire Alsid

Tenable Announces Intent to Acquire Alsid

Tenable Holdings, Inc. (“Tenable”) (Nasdaq: TENB), the Cyber Exposure company, today announced that it has entered into a definitive agreement to acquire Alsid SAS (“Alsid”), a leader in Active Directory security. Alsid for Active Directory is a Software as a Service (SaaS) solution with an on-premises deployment option that monitors the security of Active Directory in real time. The solution enables users to find and fix existing weaknesses with dynamic threat scoring, complexity ratings and…

Read More
1 2,550 2,551 2,552 2,553 2,554 2,693