LockBit boasts of breaching SpaceX contractor _cybernews.com
| posted by rouiejay12 in : attacks | No comments |
1

“Web Skimming Attacks – Digital Hacking Techniques for Payment Card” _securityboulevard.com
| posted by rouiejay12 in : attacks | No comments |
1

New Hiatus malware campaign targets routers _techrepublic.com
| posted by rouiejay12 in : attacks | No comments |
1

Organizations need to re-examine their approach to BEC protection _helpnetsecurity.com
| posted by rouiejay12 in : research | No comments |
1

Cloud security vendor Mitiga lands $45M, valuing the company at over $100M _techcrunch.com
| posted by rouiejay12 in : corporate | No comments |
1

The slow Tick‑ing time bomb: Tick APT group compromise of a DLP software developer in East Asia _welivesecurity.com
| posted by rouiejay12 in : research | No comments |
1

CISA Program Warns Critical Infrastructure Organizations Vulnerable to Ransomware Attacks _securityweek.com
| posted by rouiejay12 in : products_and_services | No comments |
1

Amazon-owned Ring reportedly suffers ransomware attack _csoonline.com
| posted by rouiejay12 in : attacks | No comments |
1

Dark Pink APT Group Deploys KamiKakaBot Against South Asian Entities _infosecurity-magazine.com
| posted by rouiejay12 in : attacks | No comments |
1

ESET romance scam research _itsecurityguru.org
| posted by rouiejay12 in : research | No comments |
1

STALKER 2 hacker demands Ukrainian game developer reinstates Russian language support, or else… _grahamcluley.com
| posted by rouiejay12 in : threats | No comments |
1

FBI reveals that more money is lost to investment fraud than ransomware and business email compromise combined _bitdefender.com
| posted by rouiejay12 in : government | No comments |
1

AT&T Vendor Breach Exposes Data on 9M Wireless Accounts _darkreading.com
| posted by rouiejay12 in : attacks | No comments |
1

DrayTek VPN routers hacked with new malware to steal data, evade detection _bleepingcomputer.com
| posted by rouiejay12 in : attacks | No comments |
1

Illinois' biometric privacy law provides blueprint as states seek to curb data collection _cyberscoop.com
| posted by rouiejay12 in : government | No comments |
1

Secret Service and ICE break the law with fake phone towers _theregister.com
| posted by rouiejay12 in : threats | No comments |
1

WH Smith hit by cyber attack, current and former staff data accessed _itpro.com
| posted by rouiejay12 in : attacks | No comments |
1

Play Ransomware gang began to leak City of Oakland data _securityaffairs.com
| posted by rouiejay12 in : attacks | No comments |
1

Crooks ‘jackpot’ ATMs in Latin America with new FiXS malware _scmagazine.com
| posted by rouiejay12 in : attacks | No comments |
1

The LastPass Hack Somehow Gets Worse _wired.com
| posted by rouiejay12 in : attacks | No comments |
1

Feds warn about right Royal ransomware rampage that runs the gamut of TTPs _nakedsecurity.sophos.com
| posted by rouiejay12 in : threats | No comments |
1

Highlights from the New U.S. Cybersecurity Strategy _krebsonsecurity.com
| posted by rouiejay12 in : government | No comments |
1

US unveils new cybersecurity strategy: tighter regulations, ransomware predominant threat _cybernews.com
| posted by rouiejay12 in : government | No comments |
1

TruthFinder, Instant Checkmate user data leaked online; Sensitive information stolen in healthcare data breach _securityboulevard.com
| posted by rouiejay12 in : attacks | No comments |
1

Attackers are developing and deploying exploits faster than ever _helpnetsecurity.com
| posted by rouiejay12 in : threats | No comments |
1

Organizations Warned of Royal Ransomware Attacks _securityweek.com
| posted by rouiejay12 in : attacks | No comments |
1

Iron Tiger updates malware to target Linux platform _csoonline.com
| posted by rouiejay12 in : threats | No comments |
1

New Backdoor MQsTTang Attributed to Mustang Panda Group _infosecurity-magazine.com
| posted by rouiejay12 in : threats | No comments |
1

cyberattack on WH Smith _itsecurityguru.org
| posted by rouiejay12 in : attacks | No comments |
1

Vice Society publishes data stolen during Vesuvius ransomware attack _grahamcluley.com
| posted by rouiejay12 in : attacks | No comments |
1

Trezor crypto wallets under attack in SMS phishing campaign _tripwire.com
| posted by rouiejay12 in : attacks | No comments |
1

Sale of Stolen Credentials and Initial Access Dominate Dark Web Markets _darkreading.com
| posted by rouiejay12 in : attacks | No comments |
1

Alarming Rise in Mobile Banking Malware - Over 200,000 New Installers Discovered _gbhackers.com
| posted by rouiejay12 in : threats | No comments |
1

CISA warns of hackers exploiting ZK Java Framework RCE flaw _bleepingcomputer.com
| posted by rouiejay12 in : threats | No comments |
1

Indian transport ministry flaws potentially allowed creation of counterfeit driving licenses _portswigger.net
| posted by rouiejay12 in : threats | No comments |
1

White House faces deeply skeptical Congress as it advocates for controversial surveillance tool _cyberscoop.com
| posted by rouiejay12 in : government | No comments |
1

Dish confirms outage caused by data theft from IT systems _theregister.com
| posted by rouiejay12 in : attacks | No comments |
1

U.S. Marshals Service suffers a ransomware attack _securityaffairs.com
| posted by rouiejay12 in : attacks | No comments |
1

Dish Network confirms cyberattack _scmagazine.com
| posted by rouiejay12 in : attacks | No comments |
1

China Is Relentlessly Hacking Its Neighbors _wired.com
| posted by rouiejay12 in : attacks | No comments |
1