- If we want a passwordless future, let's get our passkey story straight
- This Week in Scams: $16.6 Billion Lost, Deepfakes Rise, and Google Email Scams Emerge | McAfee Blog
- Proof-of-concept bypass shows weakness in Linux security tools, claims Israeli vendor
- SAP NetWeaver customers urged to deploy patch for critical zero-day vulnerability
- Lenovo targets AI workloads with massive storage update
Hackers posed as flirtatious UK aerobics instructor while targeting US defense contractor’s employee
Cybersecurity researchers said that hackers with ties to the Iranian government targeted U.S. defense contractors in attempts to install malware, including by posing as a United Kingdom-based aerobics instructor. Security software firm Proofpoint said in a Wednesday report that researchers had identified “a years-long social engineering and targeted malware campaign by the Iranian-state aligned threat actor TA456,” also known as “Tortoiseshell.” The California-based cybersecurity firm said that “TA456 built a relationship across corporate and personal communication platforms with…
Read More