Sextortionists Deploy New Spyware

Sextortionists Deploy New Spyware

New spyware has been detected that targets iOS and Android users who patronize illicit sites that typically offer escort services.  The malware, named Goontact by the Lookout researchers who discovered it, targets heterosexual users in China, Korea, Japan, Thailand, and Vietnam, stealing personal information from their mobile devices.  Researchers noted: “The types of sites used to distribute these malicious apps and the information exfiltrated suggests that the ultimate goal is extortion or blackmail.” Goontact frequently disguises itself…

Read More

Download and Try the Tech Preview of Docker Desktop for M1 – Docker Blog

Download and Try the Tech Preview of Docker Desktop for M1 – Docker Blog

Last week, during the Docker Community All Hands, we announced the availability of a developer preview build of Docker Desktop for Macs running on M1 through the Docker Developer Preview Program. We already have more than 1,000 people testing these builds as of today. If you’re interested in joining the program for future releases you should do it today! As I’m sure you know by now, Apple has recently shipped the first Macs based on…

Read More

Adrozek Malware is Wreaking Havoc on Web Browsers: How to Stay Protected | McAfee Blogs Adrozek Malware is Wreaking Havoc on Web Browsers: How to Stay Protected | McAfee Blog

Adrozek Malware is Wreaking Havoc on Web Browsers: How to Stay Protected | McAfee Blogs Adrozek Malware is Wreaking Havoc on Web Browsers: How to Stay Protected | McAfee Blog

Adrozek Malware is Wreaking Havoc on Web Browsers: How to Stay Protected Every few weeks, there seems to be breaking news about large-scale data breaches that affect millions – but what about the lesser-known threats that lurk quietly in the shadows? Oftentimes, these are the scams that could wreak havoc on our day-to-day digital lives. Adrozek malware is just that: a new strain that affects web browsers, stealthily stealing credentials through “drive-by downloads,” or a…

Read More

Adrozek Malware is Wreaking Havoc on Web Browsers: How to Stay Protected | McAfee Blogs Adrozek Malware is Wreaking Havoc on Web Browsers: How to Stay Protected | McAfee Blog

Adrozek Malware is Wreaking Havoc on Web Browsers: How to Stay Protected | McAfee Blogs Adrozek Malware is Wreaking Havoc on Web Browsers: How to Stay Protected | McAfee Blog

Adrozek Malware is Wreaking Havoc on Web Browsers: How to Stay Protected Every few weeks, there seems to be breaking news about large-scale data breaches that affect millions – but what about the lesser-known threats that lurk quietly in the shadows? Oftentimes, these are the scams that could wreak havoc on our day-to-day digital lives. Adrozek malware is just that: a new strain that affects web browsers, stealthily stealing credentials through “drive-by downloads,” or a…

Read More

Cisco Collaboration Flex Plan Now Includes Cisco Calling Plans and Better Together Security + Collaboration Offers

Cisco Collaboration Flex Plan Now Includes Cisco Calling Plans and Better Together Security + Collaboration Offers

All-in-One Collaboration Solution Spanning Calling, Messaging, Meeting, and Contact Center With World-Class Integrated Endpoints Coming off a busy week of Cisco announcements from WebexOne, I’ve never been more excited about the slate of innovation coming from Cisco Collaboration to drive experiences that are 10x better than in-person interactions, help organizations collaborate seamlessly, and transform employee and customer experiences to power an inclusive future for all. For a recap of what was shared at WebexOne, click…

Read More

3 Key Steps to Protect Your Network from Counterfeit Cisco Products – Cisco Blogs

3 Key Steps to Protect Your Network from Counterfeit Cisco Products – Cisco Blogs

Detect the signs of counterfeiting that can protect your company’s network from serious risks and millions in lost revenue.   Counterfeiting hardware and software is an illegal and lucrative trade which leads to an estimated $100B loss of revenue annually across IT industries. As one of the largest and most reputable brands in the world, Cisco is often a target of counterfeiters.   For all end-users across Cisco’s ecosystem, counterfeiting presents serious risks to network…

Read More

Industrial IoT: Top 3 trends for 2021 – Cisco Blogs

Industrial IoT: Top 3 trends for 2021 – Cisco Blogs

After 2020’s twists and turns, here’s hoping that 2021 ushers in a restored sense of “normal.” In thinking about what the upcoming year might bring for industrial IoT, three key trends emerge. Trend #1: IT will take a bolder posture to secure OT environments Cyber risks in industrial environments will continue to grow causing IT to take bolder steps to secure the OT network in 2021. The CISO and IT teams have accountability for cybersecurity…

Read More

Security Stories review of the year, with Fareedah Shaheed and Ben Munroe – Cisco Blogs

Security Stories review of the year, with Fareedah Shaheed and Ben Munroe – Cisco Blogs

Security Stories Podcast For the last Security Stories podcast of 2020, we’re joined by two very special guests. First up is Fareedah Shaheed, CEO, and founder of security consulting company Sekuva. As a serial entrepreneur, Fareedah has embarked on a brand new path, which she reveals during our chat. Fareedah has also just been named on Forbes’ 30 under 30 list, which identifies those who are making waves in technology. She has a fascinating story,…

Read More

SUNBURST Malware and SolarWinds Supply Chain Compromise | McAfee Blogs

SUNBURST Malware and SolarWinds Supply Chain Compromise | McAfee Blogs

Part I of II Situation In a blog post released 13 Dec 2020, FireEye disclosed that threat actors compromised SolarWinds’s Orion IT monitoring and management software with a trojanized version of SoalrWinds.Orion.Core.BusinessLayer.dll. The trojanized file delivers the SUNBURST malware through a backdoor as part of a digitally-signed Windows Installer Patch. Use of a Compromised Software Supply Chain (T1195.002) as an Initial Access technique is particularly critical as it can go undetected for a long period. FireEye…

Read More

Refinitiv Acquires GIACT

Refinitiv Acquires GIACT

Refinitiv has added to its cybercrime-fighting capabilities by acquiring an American digital identity, payments verification, and fraud prevention company. The definitive agreement to acquire Giact Systems, LLC (“GIACT“) was announced on November 2. News that the planned deal had officially closed was shared by Refinitiv on December 9.  GIACT was founded in Texas in 2004 and now has over 100 employees supporting more than 1,000 leading blue-chip companies, payment merchants, and financial and insurance customers.   The company helps businesses verify customers…

Read More
1 3,688 3,689 3,690 3,691 3,692 3,821