Tag: EN

Warning: Agniane Stealer Targeting Users to Steal Financial Data

Threat actors use stealers to collect sensitive information from unsuspecting users covertly. These tools are favored for their ability to infiltrate systems, remain undetected, and extract valuable data, which threat actors can exploit for financial gain and several malicious purposes.…

MoqHao Evolution Poses Immense Threat to Android Users

Cybersecurity threat experts have recently discovered a new variant of the malware named XLoader, commonly known as MoqHao, that has the ability to automatically infect devices without any user interaction. Being termed the MoqHao evolution, this is a new version…

Maryland Busts $9.5 Million #BEC Money Laundering Ring

  Three indictments have been unsealed in Maryland that document an extensive network of shell companies that were used to wash at least $9.5 Million in funds from at least fifteen #BEC (Business Email Compromise) cases across the country.   In…

How to make sense of the new SEC cyber risk disclosure rules

SEC’s new cybersecurity risk management, strategy, governance, and incident disclosure rules, which require increased transparency around cybersecurity incidents, have been in effect since December 18, 2023. For businesses that already harbor concerns over their cybersecurity protections, visibility, and incident response…

UK NCA takes control of LockBit Ransomware gang website

The LockBit ransomware gang’s payment website fell under the control of US FBI and UK’s NCA in a joint operation named ‘Operation Cronos,’ utilizing a PHP exploit to disrupt services. Visitors attempting to access the site through Onion browsers are…

The Digital Services Act is Here. Nisos Can Help!

Nisos The Digital Services Act is Here. Nisos Can Help! As of February 17, 2024, the European Union’s Digital Services Act (DSA) is in full effect… The post The Digital Services Act is Here. Nisos Can Help! appeared first on…

Why identity fraud costs organizations millions

92% of respondents to a recent report shared that their organization had been a victim of identity fraud, costing an average of $4.3 million over the last 12 months. Even so, only 40% stated identity verification as a top identity…

How decentralized identity is shaping the future of data protection

In this Help Net Security interview, Patrick Harding, Chief Architect at Ping Identity, discusses the promises and implications of decentralized identity (DCI) in cybersecurity. By redistributing identity management responsibilities among issuers, holders, and verifiers, DCI empowers individuals to selectively disclose…