Sandworm, a Russian Threat Actor, Disrupted Power in Ukraine Via Cyberattack

Sandworm, a Russian Threat Actor, Disrupted Power in Ukraine Via Cyberattack

Any company that is strategic could be targeted for the same kind of actions as this cyberattack. Follow these tips to mitigate your company’s risk to this cybersecurity threat. Mandiant, a cybersecurity company owned by Google, has revealed the details of a 2022 cyberattack run by Russian threat actor Sandworm. The threat actor compromised a Ukrainian critical infrastructure organization to manipulate its operational technology environment, resulting in a power outage that coincided with mass missile…

Read More

Google Cloud’s Cybersecurity Trends to Watch in 2024 Include Generative AI-Based Attacks

Google Cloud’s Cybersecurity Trends to Watch in 2024 Include Generative AI-Based Attacks

A November report from Google Cloud details possible nation-state malware tactics in 2024 and new angles of cyberattacks. What will cybersecurity look like in 2024? Google Cloud’s global Cybersecurity Forecast found that generative AI can help attackers and defenders and urged security personnel to look out for nation-state backed attacks and more. Contributors to the report included several of Google Cloud’s security leaders and security experts from Mandiant Intelligence, Mandiant Consulting, Chronicle Security Operations, Google…

Read More

New SecuriDropper Malware Bypasses Android 13 Restrictions, Disguised as Legitimate Applications

New SecuriDropper Malware Bypasses Android 13 Restrictions, Disguised as Legitimate Applications

A new malware is bypassing an Android 13 security measure that restricts permissions to apps downloaded out of the legitimate Google Play Store. A new report from ThreatFabric, a fraud protection company, exposes SecuriDropper malware, which is capable of bypassing Android 13 restricted settings. The malware makes Android consider the installation as coming from the Google Play Store, though in reality it isn’t. It’s highly recommended for organizations to use Mobile Device Management solutions and…

Read More

Is Your Smart TV Spying on You? | McAfee Blog

Is Your Smart TV Spying on You? | McAfee Blog

In a chilling echo of George Orwell’s dystopian novel 1984, it’s possible that Big Brother – or in this case, Big Hacker – might be surveilling you through your own television. Evidence is emerging that Smart TVs can be just as prone to hacking as home computers. Security analysts Aaron Grattafiori and Josh Yavor from iSEC Partners have spent several months investigating this issue, working alongside Smart TV manufacturers to address potential vulnerabilities. They presented…

Read More

US-B Careful: Public iPhone Chargers Lie in Wait | McAfee Blog

US-B Careful: Public iPhone Chargers Lie in Wait | McAfee Blog

It is common knowledge that connecting your devices to public Wi-Fi can expose them to potential malware and other security risks. But have you ever considered the dangers that might be lurking within public USB chargers? In a surprising revelation, researchers at Georgia Tech discovered that public iPhone chargers can be a conduit for malicious apps, posing a significant risk to your data security and privacy. The Deceptive Dangers of Public iPhone Chargers Interestingly, the…

Read More

It’s Beginning to Look a Lot Like Holiday Shopping: Secure Your Online Purchases

It’s Beginning to Look a Lot Like Holiday Shopping: Secure Your Online Purchases

As we gear up to feast with family and friends this Thanksgiving, we prepare our wallets for Black Friday and Cyber Monday. Black Friday and Cyber Monday have practically become holidays themselves, as each year, they immediately shift our attention from turkey and pumpkin pie to holiday shopping. Let’s look at these two holidays and how their popularity can impact users’ online security, and grab a great Black Friday holiday deal from McAfee. About the…

Read More

Report: Increase in Chinese-Language Malware Could ‘Challenge’ Russian Dominance of Cybercrime

Report: Increase in Chinese-Language Malware Could ‘Challenge’ Russian Dominance of Cybercrime

For decades, Russian and eastern European hackers have dominated the cybercrime underworld. These days they may face a challenge from a new contender: China. Researchers at cybersecurity firm Proofpoint say they have detected an increase in the spread of Chinese language malware through email campaigns since early 2023, signaling a surge in Chinese cybercrime activity and a new trend in the global threat landscape. “We basically went from drought to flood here,” said Selena Larson,…

Read More

Celebrities Are Lures For Scammers | McAfee Blog

Celebrities Are Lures For Scammers | McAfee Blog

In the age of digital data and Internet access, the potential for scams is more significant than ever. These scams often involve leveraging popular search queries to trap unsuspecting netizens into their malicious schemes. Among the top searches in the online world, celebrities hold a prime spot. Through this guide, we aim to shed light on how scammers take advantage of the global fascination with celebrities to target their potential victims. As digital users, most…

Read More

Small and home office router malware discovered by researchers

Small and home office router malware discovered by researchers

Small and home office router malware discovered by researchers | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Security leaders discuss NSA guide to mitigate BlackLotus threat

Security leaders discuss NSA guide to mitigate BlackLotus threat

Security leaders discuss NSA guide to mitigate BlackLotus threat | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 4 5 6 7 8 23