LaConnecta Loading please wait..
Back to Home

Cyber Security Top Stories

Cyber Security's History

Pierluigi Paganini, Security Affairs

SolarWinds hackers breached 27 state attorneys offices

Microsoft Office 365 email accounts of employees at 27 US Attorneys’ offices were breached by the Russia-linked SVR group as part of the SolarWinds hack, DoJ warns. The US Department of Justice ..

Continue reading at source

UpGuard Blog

How to Map Your Digital Footprint: 2021 Guide for Businesses | UpGuard

One of the best ways of identifying vulnerabilities in your ecosystem is by mapping your digital footprint. Read this post to learn the correct process...

Continue reading at source

Pierluigi Paganini, Security Affairs

Android Banking Trojan Vultur uses screen recording for credentials stealing

Experts spotted a new strain of Android banking Trojan dubbed Vultur that uses screen recording and keylogging for the capturing of login credentials. ThreatFabric researchers discovered a new Android..

Continue reading at source

Pierluigi Paganini, Security Affairs

CVE-2021-3490 – Pwning Linux kernel eBPF on Ubuntu machines

Researcher published an exploit code for a high-severity privilege escalation flaw CVE-2021-3490 in Linux kernel eBPF on Ubuntu machines. The security researcher Manfred Paul of the RedRocket CTF te..

Continue reading at source

Graham Cluley

Ransomware via a call centre? BazaCall means no email attachment or link required for infection

Unsuspecting users of Office 365 are being tricked by a cybercriminal gang into calling a bogus call centre, with the eventual intention of installing ransomware onto their computers.Read more in my a..

Continue reading at source

Graham Cluley

Instagram influencer Hushpuppi admits his part in scams that stole more than $24 million

Ramon Olorunwa Abbas, also known as Ray Hushpuppi, might have imagined he had it all.The self-proclaimed Billionaire Gucci Master, flamboyantly boasted about his luxurious life of expensive cars, ..

Continue reading at source

Editor, We Live Security

Week in security with Tony Anscombe

With vacations in full swing, cybercriminals will be looking to scam vacationers looking for that perfect accommodation. Learn to identify these scams. Most people are fans of the convenience provided..

Continue reading at source

Netsparker

Are you still paying consultants to do your vulnerability scanning?

Not so long ago, all application security testing was the domain of security specialists and outsourcing it was the usual way to go. With the growing popularity of agile web development, bringing at l..

Continue reading at source

Antonia Din, Heimdal Security Blog

Cybercriminal Arrested For Stealing 286K ID Scans from Estonia Government Database

A week ago, a hacker that is believed to have exploited a government photo transfer service flaw to download ID scans of 286,438 Estonian citizens from the Identity Documents Database KMAIS has been..

Continue reading at source

Paul Hamilton?, Hacker Combat

Google Explains New Safety and Privacy Guidelines for Android Apps

This week Google announced several upgrades to the rules that govern the Play Store which are intended to enhance the general user safety and privacy and give more control to...The post Google Explain..

Continue reading at source

Dora Tudor, Heimdal Security Blog

How to Secure Your Wireless Devices?

The NSA guidance is designed to help the National Security System NSS, the Department of Defense DoD, and the Defense Industrial Base DIB teleworkers. The information sheet published by the NSA ..

Continue reading at source

Dora Tudor, Heimdal Security Blog

Information Security Infosec. What Is It? Principles, Standards

Nowadays most information is stored digitally on a network, computer, server, or in the cloud, allowing criminals to easily obtain access to important information, therefore it is important to underst..

Continue reading at source

Paul Ducklin, Naked Security

S3 Ep43: Apple 0-day, pygmy hippos, hive nightmares and Twitter hacker bust Podcast

Latest episode - listen now!..

Continue reading at source

Antonia Din, Heimdal Security Blog

Cybercriminals Use Chipotles Marketing Account for Phishing Attacks

An email marketing account that belongs to the American chain of fast casual restaurants specializing in tacos Chipotle has been compromised by cybercriminals who used it to conduct a phishing campaig..

Continue reading at source

Cezarina Chirica, Heimdal Security Blog

New PayPal Credential Phishing Scam Conducted Via Live Chat Service

Recently, Cofense Phishing Defense Center analysts discovered a rather unusual PayPal credential phishing scam. Phishing is a malicious technique used by cybercriminals to gather sensitive information..

Continue reading at source

Cezarina Chirica, Heimdal Security Blog

MeteorExpress Wiper Responsible for the Iranian Railway Attack

Earlier this month, Irans transportation ministry confirmed a cyberattack against its computer systems, which has caused the portal page of the ministry and its affiliated pages to go offline. Messag..

Continue reading at source

Amer Owaida, We Live Security

Watch out for these scams, targeting Amazons customers

Most people are fans of the convenience Amazon brings to online shopping, and thats precisely what cybercriminals are betting on.The post Watch out for these scams, targeting Amazons customers appea..

Continue reading at source

Pierluigi Paganini, Security Affairs

Estonia ‘s police arrested a Tallin resident who stole 286K ID scans from a government DB

Estonia ‘s police arrested a man from Tallinn that is suspected to be the hacker who stole 286K ID scans from the government systems. Estonian police arrested a man from Tallinn that is suspecte..

Continue reading at source

Pierluigi Paganini, Security Affairs

Meteor was the wiper used against Irans national railway system

Therecent attack against Irans national railway systemwas caused by a wiper malware dubbedMeteorand not by a ransomware as initially thought. According to research from AmnpardazandSentinelOne, the r..

Continue reading at source

The Cyber Beat

7292021

Israeli Government Agencies Visit NSO Group OfficesSouth Africas Transnet Restores Operations at Ports After Cyber Attack ...Death Kitty? Cybersecurity Chiefs Are in High Demand as Companies Face..

Continue reading at source