Schulte provided a trove of CIA documents to WikiLeaks, which published the data under the labels ‘Vault 7’ and ‘Vault 8’ in 2017 Story on PCMag
Latest
What Is Cyber Threat Hunting? (Definition and How it Works)
Cyber threat hunting involves proactively searching for threats on an organization’s network that are unknown to (or missed by) traditional cybersecurity… Story on TechRepublic
Top 7 Cloud Storage Security Issues and Risks (+ Mitigations)
Cloud storage security issues refer to the operational and functional challenges that organizations and consumers encounter when storing data in the cloud… Story on eSecurity Planet
7 hacking tools that look harmless but can do real damage
One of the best ways to stay safe and secure when using your computers and other electronic devices is to be aware of the risks Story on ZDNet
Growing Number of Ransomware Victims Are Refusing to Pay
Companies are now more adept at recovering from ransomware attacks, providing less of an incentive to pay the hackers, according to Coveware Story on PCMag
Apple’s new Stolen Device Protection has a big vulnerability. Here’s how to fix it
Last week, Apple released iOS 17.3 with much anticipated updates such as Collaborative Apple Music Playlists and AirPlay… Story on ZDNet
Microsoft Says State-Sponsored Attackers Accessed Senior Leaders’ Emails
Microsoft disclosed on Jan. 19 that a nation-state backed attack occurred beginning in November 2023 in which the Russian state-sponsored threat actor group… Story on TechRepublic
New Mac Malware Spreads Through Pirated Software
The malware is designed to steal cryptocurrency from infected users running newer versions of macOS, according to Kaspersky Story on PCMag
Google: Russian Hackers Using Encrypted PDFs as a Ploy to Spread Malware
Kremlin-backed hackers are serving up encrypted PDFs to manipulate victims into installing a decryption utility that’s actually malware Story on PCMag
Androxgh0st Malware Botnet Steals AWS, Microsoft Credentials and More
The Androxgh0st malware botnet is used for victim identification and exploitation in targeted networks, as well as credentials collection Story on TechRepublic