A new publication from Google’s Threat Analysis Group focuses on commercial surveillance vendors, whose services are bought by governments for monitoring or… Story on TechRepublic
Category: Cybersecurity
Ransomware Attacks Rake in Over $1 Billion in 2023 for New Record
Payments to ransomware attackers surge in 2023, doubling in value from the previous year, according to data from Chainalysis Story on PCMag
4 Threat Hunting Techniques to Prevent Bad Actors in 2024
Today’s cybersecurity threats are highly sophisticated; bad actors are using technology like no-code malware and AI-generated phishing campaigns to breach… Story on TechRepublic
3 million smart toothbrushes were just used in a DDoS attack. Really
It sounds more like science fiction than reality, but Swiss newspaper Aargauer Zeitung reports that approximately three million smart toothbrushes were just used… Story on ZDNet
Botnet Attack Targeted Routers: A Wake-Up Call for Securing Remote Employees’ Hardware
State-sponsored hackers affiliated with China have targeted small office/home office routers in the U.S. in a wide-ranging botnet attack, Federal Bureau of… Story on TechRepublic
US Identifies and Sanctions Iranians Behind Water Facility Hacks
The Treasury Department says six officials with Iran’s Islamic Revolutionary Guard Corps are behind the hacking of water treatment facilities in the US… Story on PCMag
Ex-CIA Software Developer Gets 40 Years for Giving Stolen Docs to WikiLeaks
Schulte provided a trove of CIA documents to WikiLeaks, which published the data under the labels ‘Vault 7’ and ‘Vault 8’ in 2017 Story on PCMag
What Is Cyber Threat Hunting? (Definition and How it Works)
Cyber threat hunting involves proactively searching for threats on an organization’s network that are unknown to (or missed by) traditional cybersecurity… Story on TechRepublic
Top 7 Cloud Storage Security Issues and Risks (+ Mitigations)
Cloud storage security issues refer to the operational and functional challenges that organizations and consumers encounter when storing data in the cloud… Story on eSecurity Planet
7 hacking tools that look harmless but can do real damage
One of the best ways to stay safe and secure when using your computers and other electronic devices is to be aware of the risks Story on ZDNet