Category: security
European Space Agency hack sees official store hijacked to steal customer details
Security researchers found a malicious script on ESA’s web shop The script creates a fake Stripe page at checkout, grabbing payment data The shop is currently unavailable The website of the European Space Agency (ESA) was recently compromised with a credit card skimmer, putting countless people at risk of wire…
Read MoreDark Web cybercriminals are buying up ID to bypass KYC methods
Researchers from iProov found a group buying up ID data from consumers The data is being used to bypass KYC processes Companies will need to go for a multi-layered approach, iProov says Hackers have found an easy and simple way to grab people’s sensitive information, and then use it to…
Read MoreHackers are using Russian domains to launch complex document-based phishing attacks
Data exfiltration tactics are shifting toward Russian domains Remote Access Trojans see a 59% rise in phishing emails Malicious emails now bypass secure gateways every 45 seconds New research has found there is a significant increase in malicious email activity as well as a shift in attack strategies. On average,…
Read MoreInterlock ransomware attacks highlight need for greater security standards on critical infrastructure
Standing privilege can be minimized using the zero trust principle Critical servers can be protected by enabling just-in-time access FreeBSD jails can help to isolate workloads and enhance defense A recently discovered ransomware group has been observed targeting organizations with a focus on FreeBSD servers. Launched in late September 2024,…
Read MoreThis devious two-step phishing campaign uses Microsoft tools to bypass email security
Two-step phishing evades security with user-triggered actions Fake Microsoft portals harvest sensitive login credentials fast Advanced threat detection is key to fighting phishing A two-step phishing attack is leveraging Microsoft Visio files (.vsdx) and SharePoint, marking a new chapter in cyber deception, experts have warned. Perception Point’s security researchers reported…
Read MoreHackers are tricking victims into scam-yourself attacks with fake tutorials, CAPTCHAs, and updates
AI continues to play a dual role in cybersecurity Lumma Stealer rises 1154%, marking a new malware peak Outdated systems remain vulnerable to ransomware In its recent Q3 2024 Threat Report, Gen highlights alarming trends that reveal the rising complexity of cyber threats, highlighting that as cybercriminals refine their methods,…
Read MoreRecent Posts
- Mozilla is already revising its new Firefox terms to clarify how it handles user data
- How to watch Brit Awards 2025 online from anywhere and for free
- Google’s co-founder tells AI staff to stop ‘building nanny products’
- Around $40 billion worth of illicit crypto transactions took place in 2024
- Zapier says someone broke into its code repositories and may have accessed customer data
Archives
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010