Sneaky Log Phishing Scheme Targets Two-Factor Security

Sneaky Log Phishing Scheme Targets Two-Factor Security

Security researchers at French firm Sekoia detected a new phishing-as-a-service kit targeting Microsoft 365 accounts in December 2024, the company announced on Jan. 16. The kit, called Sneaky 2FA, was distributed through Telegram by the threat actor service Sneaky Log. It is associated with about 100 domains and has been active since at least October 2024. Sneaky 2FA is an adversary-in-the-middle attack, meaning it intercepts information sent between two devices: in this case, a device…

Read More

UK Considers Banning Ransomware Payments

UK Considers Banning Ransomware Payments

The U.K. government is considering banning ransomware payments to make critical industries “unattractive targets for criminals.” It would apply to all public sector bodies and critical national infrastructure, which includes NHS trusts, schools, local councils, and data centres. Currently, all government departments nationwide are banned from paying cyber criminals to decrypt their data or prevent it from being leaked. This rule intends to protect the services and infrastructure the British public relies on from financial…

Read More

Protecting AI so AI Can Improve the World, Safely

Protecting AI so AI Can Improve the World, Safely

The world is in the middle of an unprecedented era of artificial intelligence innovation. Looking ahead, there will be two types of companies: those who will lead on AI and those that risk irrelevance. For the organizations who take AI seriously, the composition of their workforce is about to change dramatically. Today, their workforce is entirely human. Tomorrow, it will expand exponentially to include a variety of AI workers—including apps, agents, robots, and even humanoids….

Read More

US Chip Export Rule Proposes Limits to Thwart Chinese GPUs

US Chip Export Rule Proposes Limits to Thwart Chinese GPUs

The federal government on Jan. 13 proposed a global policy to limit the distribution of powerful, U.S.-made GPUs, an effort to promote U.S. dominance over China in the AI chip industry. “To enhance U.S. national security and economic strength, it is essential that we do not offshore this critical technology and that the world’s AI runs on American rails,” the White House’s announcement reads. The White House moved forward with the proposal despite pushback from…

Read More

US to Launch Cyber Trust Mark to Label Secure Smart Devices

US to Launch Cyber Trust Mark to Label Secure Smart Devices

The U.S. government is set to introduce a seal of approval to help consumers identify secure internet-connected devices, the White House announced in a press release on Jan. 7. The U.S. Cyber Trust Mark will certify devices that meet certain security standards. Following the initiative’s first announcement in July 2023, the Federal Communications Commission provided details on Tuesday about how companies can submit their products for approval under the new label. The label applies to…

Read More

China-Linked Cyber Threat Group Hacks US Treasury Department

China-Linked Cyber Threat Group Hacks US Treasury Department

A Chinese-state-sponsored cyberattack compromised the U.S. Treasury, gaining access to classified documents through a vulnerability through third-party cybersecurity provider BeyondTrust. The breach, revealed on Dec. 31, underscores the growing sophistication of state-backed cyber espionage efforts. “Treasury takes very seriously all threats against our systems, and the data it holds,” a department spokesperson said in a statement. “Over the last four years, Treasury has significantly bolstered its cyber defense, and we will continue to work with…

Read More

What Is Patch Tuesday? Microsoft's Monthly Update Explained

What Is Patch Tuesday? Microsoft's Monthly Update Explained

On the second Tuesday of each month, Microsoft and other tech companies release patches for consumer and enterprise users. These updates, including bug fixes and security enhancements from the previous month, are known as “Patch Tuesday.” The monthly update is an important opportunity to ensure that security features and applications are up to date. Microsoft details the official Patch Tuesday release in their Security Update Guide. Below, TechRepublic explores its purpose, how it works, and…

Read More

Windows 11 Media Update Bug Stops Security Updates

Windows 11 Media Update Bug Stops Security Updates

Admins, take caution if you use physical media to install Windows security updates, Microsoft warned on Dec. 24. Installing the October or November 2024 updates for Windows 11, version 24H2 using a CD or a USB flash drive could prevent the operating system from accepting future security updates. How to prevent Windows 11 version 24H2 from locking up security updates The problem with the October or November 2024 update for Windows 11, version 24H2 only…

Read More

Protect 3 Devices With This Maximum Security Software

Protect 3 Devices With This Maximum Security Software

TL;DR: Protect your privacy on three devices with a 1-year subscription to Trend Micro Maximum Security for $19.99 (reg. $49.99). Cyber threats have become more sophisticated, and even cautious users can find themselves vulnerable to ransomware attacks, phishing schemes, and identity theft. A single click on the wrong link or a cleverly disguised email can lead to encrypted files, stolen credentials, or compromised accounts. Tech-savvy users know how to spot the signs of a scam…

Read More

Navigating the Cyber Threat Landscape: Lessons Learned & What’s Ahead

Navigating the Cyber Threat Landscape: Lessons Learned & What’s Ahead

The cybersecurity landscape in 2024 was marked by unprecedented challenges, significant breaches, and evolving regulatory requirements that fundamentally reshaped how organizations approach data protection. From record-breaking incidents to stringent new legislation, the year provided crucial insights into cybersecurity. It highlighted critical priorities for strengthening organizational defenses in an increasingly complex digital ecosystem. The escalating sophistication of cyber threats and the expanding attack surface created by digital transformation initiatives posed unprecedented challenges for organizations across all…

Read More
1 2 3 25