Naked Security
S3 Ep114: Preventing cyberthreats – stop them before they stop you! [Audio + Text]
Join world-renowned expert Fraser Howard, Director of Research at SophosLabs, for this fascinating episode on how to fight cybercrime.
Naked Security
Join world-renowned expert Fraser Howard, Director of Research at SophosLabs, for this fascinating episode on how to fight cybercrime.
Bleeping Computer
Atom Silo, a newly spotted ransomware group, is targeting a recently patched and actively exploited Confluence Server and Data Center vulnerability to deploy their ransomware payloads.
Naked Security
“Install this moneymaking app” – this one is so special that it isn’t available on Google Play or the App Store!
Security Affairs
The code of the recently-emerged Entropy ransomware has similarities with the one of the infamous Dridex malware. The recently-emerged Entropy ransomware has code similarities with the popular Dridex malware. Experts from Sophos analyzed the code of Entropy ransomware employed in two distinct attacks. “A pair of incidents at different organizations in which attackers deployed a […]
Bleeping Computer
A vigilante developer turns the tables on software pirates by distributing malware that prevents them from accessing pirated software sites in the future.
Naked Security
No zero-days this month, if you ignore the Edge RCE hole patched last week
Bleeping Computer
Avast has just released a decryption tool that will help AtomSilo and LockFile ransomware victims recover some of their files for free, without having to pay a ransom.
Naked Security
We tried it out to make sure, so you don’t have to.
Bleeping Computer
Analysis of the recently-emerged Entropy ransomware reveals code-level similarities with the general purpose Dridex malware that started as a banking trojan.
Bleeping Computer
Recent AvosLocker ransomware attacks are characterized by a focus on disabling endpoint security solutions that stand in the way of threat actors.
Naked Security
Get the update now… if it’s available for your phone. Here’s how to check.
Bleeping Computer
The holiday season is here, but there is no rest for our weary admins as ransomware gangs are still conducting attacks over the Christmas and New Years breaks.
Bleeping Computer
Analysis of the recently-emerged Entropy ransomware reveals code-level similarities with the general purpose Dridex malware that started as a banking trojan.
Naked Security
Five tips to keep yourself, and your friends and family, out of the clutches of “chopping block” scammers…
Bleeping Computer
While ransomware attacks continued throughout the week, for the most part, it has been quieter than usual, with only a few new variants released.
Bleeping Computer
Operators of an unknown ransomware gang are using a Python script to encrypt virtual machines hosted on VMware ESXi servers.
Naked Security
Easy unauthenticated remote code execution – PoC code already out
Bleeping Computer
This week we saw an existing operation rise in attacks while existing ransomware operations turn to Windows vulnerabilities to elevate their privileges.
Naked Security
Apps on your iPhone must come from the App Store. Except when they don’t… we explain what to look out for.
Naked Security
Lots of lovely patches for your Valentine’s Day delight. Get ’em as soon as you can…
Bleeping Computer
Ransomware has continued to be part of the 24-hour news cycle as another significant attack against critical infrastructure took place this week.
Trend Micro
In this blog entry, we discuss the reasons why malicious actors choose to and opt not to pursue kernel-level access in their attacks. It also provides an overview of kernel-level threats that have been publicly reported from April 2015 to October 2022.
Naked Security
Is Secure Boot without the Secure just “Boot”?
Naked Security
Here’s a brief reminder to do two things. The first is to patch. The second is to read up why it’s a good idea to patch…
Naked Security
New report admits that attackers were detected in the network about three months ago, and may have been attacking for about three years.
Naked Security
Booby-trapped app, apparently signed and shipped by 3CX itself after its source code repository was broken into.
Naked Security
Get ’em while they’re hot. And get ’em for the very last time, if you still have Windows 7 or 8.1…
Naked Security
An email you haven’t even looked at yet could be used to trick Outlook into helping crooks to logon as you.
Naked Security
In all the excitement, we kind of lost track ourselves. Were there six 0-days, or only four?
Naked Security
Fortunately, it’s not a major bugfix, which means it’s easy to patch and can teach us all some useful lessons.
Naked Security
I’m sorry, Dave. I’m afraid I can’t… errr, no, hang on a minute, I can do that easily! Worldwide! Right now!
Cyber Security News
Best AWS Network Access Security : 1. Perimeter 81 2. Amazon Web Services (AWS) Security 3. Palo Alto Networks 4. Fortinet 5. CheckPoint.
Naked Security
Latest episode – listen now (or read if you prefer)…
Naked Security
Tell us in the comments… What’s the REAL reason there was no Windows 9? (No theory too far-fetched!)