Leaked documents show how firm supports Chinese hacking operations

February 22, 2024 0 Comments 0 tags

A tranche of documents posted to GitHub five days ago reveals that Chinese contractors working to support Beijing’s hacking operations are a lot like office drones everywhere but with a twist: They complain

Microsoft rolls out expanded logging six months after Chinese breach

February 21, 2024 0 Comments 0 tags

When hackers working on behalf of the Chinese government stole a Microsoft signing key and used it to breach the email accounts of senior U.S. government officials last year, that

NCSC Sounds Alarm Over Private Branch Exchange Attacks

February 21, 2024 0 Comments 0 tags

The UK’s National Cyber Security Centre has produced new guidance for smaller firms on PBX attacks

Mozilla Releases Security Updates for Firefox and Thunderbird

February 21, 2024 0 Comments 0 tags

Mozilla released security updates to address vulnerabilities in Firefox, Firefox ESR, and Thunderbird. A cyber threat actor could exploit one of these vulnerabilities to take control of an affected system.

CISA, EPA, and FBI Release Top Cyber Actions for Securing Water Systems

February 21, 2024 0 Comments 0 tags

Today, CISA, the Environmental Protection Agency (EPA), and the Federal Bureau of Investigation (FBI) released the joint fact sheet Top Cyber Actions for Securing Water Systems. This fact sheet outlines

Russian Hackers Launch Email Campaigns to Demoralize Ukrainians

February 21, 2024 0 Comments 0 tags

ESET researchers reveal a Russian threat actor has targeted Ukrainian citizens with PYSOPs messages warning of impacts such as food and medicine shortages from the war

Details of a Phone Scam

February 21, 2024 0 Comments 0 tags

First-person account of someone who fell for a scam, that started as a fake Amazon service rep and ended with a fake CIA agent, and lost $50,000 cash. And this

IBM: Identity Compromises Surge as Top Initial Access Method for Cybercriminals

February 21, 2024 0 Comments 0 tags

Compromising valid identities became the top initial access vector in 2023 while phishing dropped to second place, IBM found in a new report

Apple rolls out quantum-resistant cryptography for iMessage

February 21, 2024 0 Comments 0 tags

At some point in coming decades, advances in quantum computing are expected to break most forms of contemporary cryptography, and now Apple is taking steps to protect its flagship messaging

Exclusive: eSentire Confirms Rhysida Ransomware Victims

February 21, 2024 0 Comments 0 tags

Since emerging in May 2023, the group claims to have victimized 77 companies and public institutions