Hackers Opting New Attack Methods After Microsoft Blocked Macros by Default

Hackers Opting New Attack Methods After Microsoft Blocked Macros by Default

With Microsoft taking steps to block Excel 4.0 (XLM or XL4) and Visual Basic for Applications (VBA) macros by default across Office apps, malicious actors are responding by refining their tactics, techniques, and procedures (TTPs). “The use of VBA and XL4 Macros decreased approximately 66% from October 2021 through June 2022,” Proofpoint said in a report shared with The Hacker News, calling it “one of the largest email threat landscape shifts in recent history.” In…

Read More

Kelli Burns named SVP, CISO at Accolade

Kelli Burns named SVP, CISO at Accolade

Kelli Burns named SVP, CISO at Accolade | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Hackers Use Evilnum Malware to Target Cryptocurrency and Commodities Platforms

Hackers Use Evilnum Malware to Target Cryptocurrency and Commodities Platforms

The advanced persistent threat (APT) actor tracked as Evilnum is once again exhibiting signs of renewed activity aimed at European financial and investment entities. “Evilnum is a backdoor that can be used for data theft or to load additional payloads,” enterprise security firm Proofpoint said in a report shared with The Hacker News. “The malware includes multiple interesting components to evade detection and modify infection paths based on identified antivirus software.” Targets include organizations with…

Read More

Revisions released around internationally recognized information security standards

Revisions released around internationally recognized information security standards

Revisions released around internationally recognized information security standards | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Costa Rica in crisis: Russian ransomware raises its head

Costa Rica in crisis: Russian ransomware raises its head

Costa Rica in crisis: Russian ransomware raises its head | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

How higher ed can prepare the next generation of IT

How higher ed can prepare the next generation of IT

<!– How higher ed can prepare the next generation of IT | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

24 billion usernames, passwords available on the dark web

24 billion usernames, passwords available on the dark web

<!– 24 billion usernames, passwords available on the dark web | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

BlackBerry discovers Symbiote malware, a highly evasive Linux threat

BlackBerry discovers Symbiote malware, a highly evasive Linux threat

<!– BlackBerry discovers Symbiote malware, a highly evasive Linux threat | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

VCs, Tech Firms Want to Raise $1 Million for Bay Area Cyber Education

VCs, Tech Firms Want to Raise  Million for Bay Area Cyber Education

Venture-capital firms, security chiefs and technology companies in San Francisco are raising money to help tackle the cybersecurity skill shortage in a unique way—by funding education for would-be cyber pros at community colleges in the Bay Area for a year. The initiative, run by nonprofit cyber training company NextGen Cyber Talent Inc., aims to raise $1 million from individuals and companies to reimburse students for the cost of cybersecurity courses at Bay Area community colleges…

Read More

Chris Krebs named Chair of Rubrik’s New CISO Advisory Board

Chris Krebs named Chair of Rubrik’s New CISO Advisory Board

<!– Chris Krebs named Chair of Rubrik’s New CISO Advisory Board | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More
1 7 8 9 10 11 35