Dark
CISO Checklist for Offboarding Security Staff

The Great Resignation strikes cybersecurity teams too. Here's a checklist for CISOs to ensure security is retained even as security staff is not....

Read more
Dark
Researchers Warn of Stealthy Chinese Backdoor Targeting Multiple Foreign Agencies

A stealthy backdoor program used by China-linked threat actors has targeted government computers at multiple foreign agencies, allowing attackers to retain a presence on sensitive networks and exfiltrate data while remaining...

Read more
News
100 Million Samsung Galaxy Phones Affected with Flawed Hardware Encryption Feature


A group of academics from Tel Aviv University have disclosed details of now-patched "severe" design flaws affecting about 100 million Android-based Samsung smartphones that could have resulted in the extraction of...

Read more
Infosec
#ShieldsUp – Now is the time to double‑check cybersecurity processes and operations

As the conflict in Ukraine heightens the risk of cyberattacks globally, what can organizations do to improve their resiliency? The post #ShieldsUp – Now is the time to double‑check cybersecurity processes and operations appeared first on WeLiveSecurity

Read more
News
Reborn of Emotet: New Features of the Botnet and How to Detect it


One of the most dangerous and infamous threats is back again. In January 2021, global officials took down the botnet. Law enforcement sent a destructive update to the Emotet's executables. And...

Read more
News
CISA Warns of High-Severity Flaws in Schneider and GE Digital's SCADA Software


The U.S. Cybersecurity and Infrastructure Security Agency (CISA) last week published an industrial control system (ICS) advisory related to multiple vulnerabilities impacting Schneider Electric's Easergy medium voltage protection relays. "Successful exploitation of these...

Read more
News
Experts Create Apple AirTag Clone That Can Bypass Anti-Tracking Measures


Cybersecurity researchers have managed to build a clone of Apple Airtag that circumvents the anti-stalking protection technology built into its Find My Bluetooth-based tracking protocol.
The result is a stealth AirTag that...

Read more
Infosec
Beware of charity scams exploiting war in Ukraine

Looking to help people in Ukraine? Donate wisely – do your research first so you give without getting scammed The post Beware of charity scams exploiting war in Ukraine appeared first on WeLiveSecurity

Read more
News
Social Media Hijacking Malware Spreading Through Gaming Apps on Microsoft Store


A new malware capable of controlling social media accounts is being distributed through Microsoft's official app store in the form of trojanized gaming apps, infecting more than 5,000 Windows machines in...

Read more
News
Russia-Ukraine War: Phishing, Malware and Hacker Groups Taking Sides


Ukraine's Computer Emergency Response Team (CERT-UA) has warned of Belarusian state-sponsored hackers targeting its military personnel and related individuals as part of a phishing campaign mounted amidst Russia's military invasion of...

Read more