Lazarus Hackers’ Linux Malware Linked to 3CX Supply-Chain Attack

Lazarus Hackers’ Linux Malware Linked to 3CX Supply-Chain Attack

New cyber research connects the infamous North Korea-aligned Lazarus Group behind the Linux malware attack called Operation DreamJob to the 3CX supply-chain attack. In the company's April 20 Live Security cyber report,... Read more »
Ad Widget
Investment Scams Skyrocket, Victims in US Fleeced for $4B in 2022

Investment Scams Skyrocket, Victims in US Fleeced for $4B in 2022

Consumers in the U.S. lost more than $4 billion to investment scams in 2022, and this year is expected to be worse. This rip-off trend is growing as investment scams become increasingly... Read more »
FBI Issues Warning About ‘Juice Jacking’ at Public USB Charging Stations

FBI Issues Warning About ‘Juice Jacking’ at Public USB Charging Stations

The FBI's Denver office is cautioning consumers about using free public charging stations, saying bad actors can use the USB ports at the juice stops to introduce malware and monitoring software onto... Read more »
To Combat Generative AI Email Threats, Fight Fire With Fire

To Combat Generative AI Email Threats, Fight Fire With Fire

Human brain power is no match for hackers emboldened with artificial intelligence-powered digital smash-and-grab attacks using email deceptions. Consequently, cybersecurity defenses must be guided by AI solutions that know hackers' strategies better... Read more »
Top Salary for Cybercriminals Can Exceed $1M

Top Salary for Cybercriminals Can Exceed $1M

If crime doesn't pay, some cybercriminals wouldn't know it. A top team member in a cybercrime outfit like Conti can make an estimated US$1.1 million a year, according to a report released... Read more »
Hackers Are Cashing In With Hijacked IP Addresses

Hackers Are Cashing In With Hijacked IP Addresses

Online raiders are stealing IP addresses and converting them to cash by selling them to so-called proxyware services. Malicious actors are planting proxyware on computers without the owner's knowledge, then selling the... Read more »
How Generative AI Will Transform Cybersecurity

How Generative AI Will Transform Cybersecurity

Generative AI will help detect cyber threats and protect systems from human error and other vulnerabilities that lead to breaches. Microsoft last week announced that, just as it did with .NET years... Read more »
Leaky Pet App Dilemma Can Lead to Serious Cybersecurity Problems

Leaky Pet App Dilemma Can Lead to Serious Cybersecurity Problems

Is it worth exposing your personal data in return for the convenience of using pet apps on your smartphone? Pet apps leaking your sensitive information has probably not been a mindful topic... Read more »
Consumers, Businesses: It’s Time To Self-Protect Against Tax Season Fraud

Consumers, Businesses: It’s Time To Self-Protect Against Tax Season Fraud

Tax fraud schemes in 2022 netted scammers $5.7 billion, more than twice the amount of the previous year, according to the Internal Revenue Service, and there doesn't appear to be any letup... Read more »
AU10TIX, Microsoft Team Up on Verifiable Credentials Solution

AU10TIX, Microsoft Team Up on Verifiable Credentials Solution

A strong credential solution that promises cost savings for enterprises and better privacy for users was announced Monday by AU10TIX, an Israeli identity verification and management company. The firm stated it's working... Read more »
Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Powered By
Best Wordpress Adblock Detecting Plugin | CHP Adblock
A note to our visitors

This website has updated its privacy policy in compliance with changes to European Union data protection law, for all members globally. We’ve also updated our Privacy Policy to give you more information about your rights and responsibilities with respect to your privacy and personal information. Please read this to review the updates about which cookies we use and what information we collect on our site. By continuing to use this site, you are agreeing to our updated privacy policy.