What happens after we die? We know the body is left behind, but from ancient times there are myriad views on what happens to the soul, spirit, or mojo… Story on PCMag
Month: April 2023
New Mac Malware, Possibly From North Korea, Masquerades as PDF Viewer
It looks like North Korean hackers are back with another macOS malware, which is circulating via a PDF viewer app Story on PCMag
Attackers Continue to Leverage Signed Microsoft Drivers
In December of last year, Microsoft worked with SentinelOne, Mandiant, and Sophos to respond to an issue in which drivers certified by Microsoft’s Windows… Story on eSecurity Planet
3CX Supply Chain Attack Traced to Employee Who Installed Malicious App
The supply chain attack on the 3CX voice-calling app has been traced back to a company employee installing a legitimate, but malware-laden program, onto their… Story on PCMag
Ransomware attacks increased 91% in March, as threat actors find new vulnerabilities
Ransomware attacks have spiked, according to the NCC Group’s Global Threat Intelligence Team… Story on TechRepublic
New DDoS attacks on Israel’s enterprises should be a wake-up call
In recent days, Israel has faced cyberattacks reportedly involving Iran. Experts say the attacks demonstrate the risk that fairly… Story on TechRepublic
LockBit Ransomware Targets Apple Silicon Macs for the First Time
Security researchers discovered a new version of the LockBit ransomware which targets Apple’s Mac computers for the first time Story on PCMag
12 Simple Things You Can Do to Be More Secure Online
Every week brings news of yet another data breach. Schools, factories, websites, and even government agencies get caught with their protection down… Story on PCMag
Google Play threats on the dark web are big business
New research from Kaspersky focuses on the types of malicious services provided by cybercriminals on the dark web… Story on TechRepublic
Were you caught up in the latest data breach? Here’s how to tell
Think you’ve been involved in a data breach? This guide will help you find out where and when, and it lists the steps you… Story on ZDNet