Companies are now more adept at recovering from ransomware attacks, providing less of an incentive to pay the hackers, according to Coveware Story on PCMag
Category: Cybersecurity
Apple’s new Stolen Device Protection has a big vulnerability. Here’s how to fix it
Last week, Apple released iOS 17.3 with much anticipated updates such as Collaborative Apple Music Playlists and AirPlay… Story on ZDNet
Microsoft Says State-Sponsored Attackers Accessed Senior Leaders’ Emails
Microsoft disclosed on Jan. 19 that a nation-state backed attack occurred beginning in November 2023 in which the Russian state-sponsored threat actor group… Story on TechRepublic
New Mac Malware Spreads Through Pirated Software
The malware is designed to steal cryptocurrency from infected users running newer versions of macOS, according to Kaspersky Story on PCMag
Google: Russian Hackers Using Encrypted PDFs as a Ploy to Spread Malware
Kremlin-backed hackers are serving up encrypted PDFs to manipulate victims into installing a decryption utility that’s actually malware Story on PCMag
Androxgh0st Malware Botnet Steals AWS, Microsoft Credentials and More
The Androxgh0st malware botnet is used for victim identification and exploitation in targeted networks, as well as credentials collection Story on TechRepublic
23andMe to Hacking Victims: It’s Not Our Fault You’re Too Lazy to Change Passwords
23andMe lawyers say the company is not at fault for last year’s breach because customers ‘negligently recycled and failed to update their passwords’ Story on PCMag
Developers, watch your code: Official Python repository spread malicious projects
Cybersecurity specialist ESET discovered a series of malicious Python projects within PyPI, each of which deployed a customized backdoor containing cyberespionage functionality… Story on ZDNet
Passkeys: What They Are and Why You Need Them ASAP
Understanding Passkeys and why they are so important for your digital security… Story on PCMag
Top cybersecurity threats for 2023
The rise and rapid adoption of new innovative technologies, such as generative artificial intelligence, no-code apps, automation and the Internet of Things, have led to a great many security compromises… Story on TechRepublic