Blogs from all around the World



Latest news clusters for enRead More


Friday Squid Blogging: Squid Skin Is Naturally Anti-microbial

Often it feels like squid just evolved better than us mammals. As usual, you can also use this squid post


ISMG Editors’ Panel: Ransomware Update

Latest news clusters for enRead More


LemonDuck no longer settles for breadcrumbs

LemonDuck is a versatile botnet that has expanded from infecting targets with cryptominers to more malicious malware. Categories: Botnets Tags:


I Am Parting With My Crypto Library

The time has come for me to find a new home for my (paper) cryptography library. It’s about 150 linear


Ransomware via a call centre? BazaCall means no email attachment or link required for infection

Unsuspecting users of Office 365 are being tricked by a cybercriminal gang into calling a bogus call centre, with the


Russia’s APT29 Still Actively Delivering Malware Used in COVID-19 Vaccine Spying

The Russian cyberespionage group known as APT29 and Cozy Bear is still actively delivering a piece of malware named WellMess,


Spear-phishing now targets employees outside the finance and executive teams, report says

Employees in “low profile roles,” such as IT and sales, are now favorite targets of spear phishing attacks, says a


Android Banking Trojan ‘Vultur’ Abusing Accessibility Services

A newly discovered Android banking Trojan relies on screen recording and keylogging instead of HTML overlays for the capturing of


Instagram influencer Hushpuppi admits his part in scams that stole more than $24 million

Ramon Olorunwa Abbas, also known as “Ray Hushpuppi,” might have imagined he had it all. The self-proclaimed “Billionaire Gucci Master”,


Za: Blood service hit by cyberattack

Hanno Labuschagne reports: The Western Cape Blood Service (WCBS) has confirmed its information systems have been hit by a cyberattack.


NC: Sandhills Center remains silent after threat actors claim to have hacked them and exfiltrated 634 GB of their files

Sandhills Center in North Carolina manages public mental health, intellectual/developmental disabilities and substance use disorder services for the citizens of


Window of Exposure is Expanding and Hackers Know Exactly Where to Strike

For the last 15 years, researchers have produced an annual State of Application Security report. But in the last 18


New Chinese Threat Group ‘GhostEmperor’ Targets Governments, Telecom Firms

A previously undocumented Chinese-speaking threat actor is targeting Microsoft Exchange vulnerabilities in an attempt to compromise high-profile victims, Kaspersky reveals.


Remote Code Execution Flaws Patched in WordPress Download Manager Plugin

A vulnerability patched recently in the WordPress Download Manager plugin could be abused to execute arbitrary code under specific configurations,


Storing Encrypted Photos in Google’s Cloud

New paper: “Encrypted Cloud Photo Storage Using Google Photos“: Abstract: Cloud photo services are widely used for persistent, convenient, and


Follow-up: Woman Who Stole and Sold Protected Health Information Sentenced to 2 ½ Years in Prison

There was a follow-up last week to a case has reported on several times, beginning in December, 2020 when


Microsoft Shares More Information on Protecting Systems Against PetitPotam Attacks

Microsoft has shared more information on how organizations can protect Windows domain controllers and other Windows servers against potential PetitPotam


China Orders 25 Tech Giants to Fix Raft of Problems

Bloomberg News reports: China ordered more than two dozen technology firms to carry out internal inspections as part of a campaign to


The Life Cycle of a Breached Database

Brian Krebs writes: Every time there is another data breach, we are asked to change our password at the breached


Ca: Prisoners at Mission Institution sue authorities over alleged privacy breach

Keith Fraser reports: A group of prisoners at Mission Institution is suing the authorities over an alleged breach of privacy


18 arrested for smuggling more than 490 migrants across the Balkan route

Officers from the Romanian Police (Poliția Română) and Border Police (Poliția de Frontieră Română), supported by Europol, dismantled an organised


S.Africa’s Port Terminals Restored Following Cyber-Attack

Operating systems have been restored at South Africa’s state-owned logistics firm, the company said Thursday following a cyber-attack last week


21-Year-Old Woman Pleads Guilty to Sending Phishing Emails to Political Candidates

A 21-year-old Rhode Island woman has pleaded guilty to targeting candidates for political office and their campaign staff with phishing


Belarusian Nationals Arrested for Hacking ATMs Across Europe

Two Belarusian nationals were arrested earlier this month in Poland on the suspicion they engaged in multiple ATM jackpotting attacks.


8 arrests following the seizure at sea of 15 tonnes of hashish by Spanish authorities

With the support of Europol, the Spanish Civil Guard (Guardia Civil) and Tax Agency (Agencia Tributaria), in cooperation with the


Engaging with governments is a data security priority

Global tax systems are responsible for handling and storing vast amounts of data. Whether it’s details of a supplier’s transactions


Why isn’t cloud backup part of common security practices?

The threat of ransomware is omnipresent, and the tactics deployed by cybercriminals are constantly evolving to wreak as much havoc


What should IT leaders look for in an SD-WAN solution?

The phrase “game-changing” has become almost overused in recent years, particularly in the world of tech. To an extent, this


Accenture: An Automation Maturity Journey

Accenture, an early adopter of the Capability Maturity Model Integration (CMMI) frame-work, faced numerous challenges related to a rapidly changing


The Life Cycle of a Breached Database

Latest news clusters for enRead More


BlackMatter rises from the ashes of notorious cybercrime gangs to pose new ransomware threat

A new ransomware gang that calls itself BlackMatter has launched itself on the dark web, and is actively attempting to