Threat actors use stealers to collect sensitive information from unsuspecting users covertly. These tools are favored for their ability to infiltrate systems, remain undetected, and extract valuable data, which threat actors can exploit for financial gain and several malicious purposes.…
Tag: EN
Two days into the Digital Services Act, EU wields it to deepen TikTok probe
Bloc isn’t happy with made-in-China network’s efforts to protect kids and data Two days after its Digital Services Act (DSA) came into effect, the European Union used it to open an investigation into made-in-China social network TikTok.… This article has…
Cactus ransomware gang claims the theft of 1.5TB of data from Energy management and industrial automation firm Schneider Electric
The Cactus ransomware gang claims the theft of 1.5TB of data from the Energy management and industrial automation firm Schneider Electric. The Cactus ransomware group claims responsibility for pilfering 1.5TB of data from the Energy management and industrial automation giant…
MoqHao Evolution Poses Immense Threat to Android Users
Cybersecurity threat experts have recently discovered a new variant of the malware named XLoader, commonly known as MoqHao, that has the ability to automatically infect devices without any user interaction. Being termed the MoqHao evolution, this is a new version…
Maryland Busts $9.5 Million #BEC Money Laundering Ring
Three indictments have been unsealed in Maryland that document an extensive network of shell companies that were used to wash at least $9.5 Million in funds from at least fifteen #BEC (Business Email Compromise) cases across the country. In…
How to make sense of the new SEC cyber risk disclosure rules
SEC’s new cybersecurity risk management, strategy, governance, and incident disclosure rules, which require increased transparency around cybersecurity incidents, have been in effect since December 18, 2023. For businesses that already harbor concerns over their cybersecurity protections, visibility, and incident response…
Iran and Hezbollah Hackers Launch Attacks to Influence Israel-Hamas Narrative
Hackers backed by Iran and Hezbollah staged cyber attacks designed to undercut public support for the Israel-Hamas war after October 2023. This includes destructive attacks against key Israeli organizations, hack-and-leak operations targeting entities in Israel and the U.S., phishing campaigns…
Hackers Arrested For Stealing Banking Credentials Using Android Malware
An individual residing in Vinnytsia, aged 31, has been apprehended for purportedly pilfering confidential data of Android users and exploiting their Google accounts belonging to citizens of the United States and Canada. The cybercrime incident resulted in the perpetrator acquiring…
LockBit Ransomware’s Darknet Domains Seized in Global Law Enforcement Raid
An international law enforcement operation has led to the seizure of multiple darknet domains operated by LockBit, one of the most prolific ransomware groups, marking the latest in a long list of digital takedowns. While the full extent of the effort,…
UK NCA takes control of LockBit Ransomware gang website
The LockBit ransomware gang’s payment website fell under the control of US FBI and UK’s NCA in a joint operation named ‘Operation Cronos,’ utilizing a PHP exploit to disrupt services. Visitors attempting to access the site through Onion browsers are…
The Digital Services Act is Here. Nisos Can Help!
Nisos The Digital Services Act is Here. Nisos Can Help! As of February 17, 2024, the European Union’s Digital Services Act (DSA) is in full effect… The post The Digital Services Act is Here. Nisos Can Help! appeared first on…
Why identity fraud costs organizations millions
92% of respondents to a recent report shared that their organization had been a victim of identity fraud, costing an average of $4.3 million over the last 12 months. Even so, only 40% stated identity verification as a top identity…
How decentralized identity is shaping the future of data protection
In this Help Net Security interview, Patrick Harding, Chief Architect at Ping Identity, discusses the promises and implications of decentralized identity (DCI) in cybersecurity. By redistributing identity management responsibilities among issuers, holders, and verifiers, DCI empowers individuals to selectively disclose…
Vietnam to collect biometrics – even DNA – for new ID cards
Iris scan, voice samples and blood type to be included in database The Vietnamese government will begin collecting biometric information from its citizens for identification purposes beginning in July this year.… This article has been indexed from The Register –…
Hackers Arrested For Stealing Banking Credentials Using Novel Android Malware
An individual residing in Vinnytsia, aged 31, has been apprehended for purportedly pilfering confidential data of Android users and exploiting their Google accounts belonging to citizens of the United States and Canada. The cybercrime incident resulted in the perpetrator acquiring…
Clean links and sophisticated scams mark new era in email attacks
Analysis of 7 billion emails shows clean links are duping users, malicious EML attachments increased 10-fold in Q4, and social engineering attacks are at all-time highs, according to VIPRE Security. The rise of the EML file attachments In 2024, QR…
36% of code generated by GitHub CoPilot contains security flaws
Security debt, defined as flaws that remain unfixed for longer than a year, exists in 42% of applications and 71% of organizations, according to Veracode. Worryingly, 46% of organizations have persistent, high-severity flaws that constitute ‘critical’ security debt, putting businesses…
Secure File Sharing for Businesses: Best Practices
Protect your sensitive data and ensure compliance by implementing secure file sharing practices, encryption methods, and tools for your business. The post Secure File Sharing for Businesses: Best Practices appeared first on Security Zap. This article has been indexed from…
UK leads takedown of LockBit ransomware gang’s website
The LockBit ransomware gang’s website has been seized, several news agencies reported late Monday. The Reuters news agency and The Register are carrying stories based on a new splash screen that has appeared on the gang’s website. It says, “This…
Artificial Intelligence in Business Security
Discover the significant benefits of utilizing Artificial Intelligence in Business Security, from threat detection to incident response, to safeguard sensitive information and assets. The post Artificial Intelligence in Business Security appeared first on Security Zap. This article has been indexed…