If you purchase via links on our site, we may receive
affiliate commissions.
Security
Emotet: the rise and fall of a criminal empire
The Emotet banking trojan has been active at least since 2014, with the botnet being operated by the Russian cybercrime organization tracked as TA542....
Read more about Emotet: the rise and fall of a criminal empire
10 APT groups that joined the MS Exchange exploitation party
At least five advanced threat actors (APTs) were exploiting the Microsoft Exchange servers before the company released patches. After Microsoft...
Read more about 10 APT groups that joined the MS Exchange exploitation party
Research: 19 petabytes of data exposed across 29,000+ unprotected databases
CyberNews researchers found that more than 29,000 databases worldwide are still completely unprotected and publicly accessible, leaving close to 19,000...
Read more about Research: 19 petabytes of data exposed across 29,000+ unprotected databases
Unpatched and unprotected: more than 80,000 PHP servers are vulnerable to cyberattacks
CyberNews researchers found more than 80,000 servers worldwide still running on outdated versions of PHP that are susceptible to hundreds...
Read more about Unpatched and unprotected: more than 80,000 PHP servers are vulnerable to cyberattacks
APT in action: XDSpy and Sandworm
Numerous advanced persistent threat (APT) groups have been attacking governments and the private sector. Some of them operated undetected for...
Read more about APT in action: XDSpy and Sandworm
Katie Moussouris about cyberespionage: it is getting a lot muddier
Foes like Russia are now using cyber tools not purely for cyber espionage but exploit them down the road for...
Read more about Katie Moussouris about cyberespionage: it is getting a lot muddier
Is Roblox secure? Static analysis reveals subpar security practices on Roblox Android app
Updated on 03/05. We updated the article with a response Roblox made public in regards to our report. Our investigation...
Read more about Is Roblox secure? Static analysis reveals subpar security practices on Roblox Android app
Honeypots: how security teams use bait to protect against cyber threats
A honeypot is a security mechanism designed to lure attackers in a specially crafted virtual trap. Honeypots intentionally appear to...
Read more about Honeypots: how security teams use bait to protect against cyber threats
2020 was the year of phishing, with a jump of 510% in the first two months alone
A new report shows a staggering 34.4% increase in phishing attacks in the last year. 2020 was a bad year...
Read more about 2020 was the year of phishing, with a jump of 510% in the first two months alone
How to secure cyber-physical supply chains
The merging of digital and physical domains is a central part of the digital transformation we're going through as part...
Read more about How to secure cyber-physical supply chains
Careless love? 15% of people use pet names as password
Human affection for animal companions knows no bounds. But maybe it should, as research shows that thousands of people put...
Read more about Careless love? 15% of people use pet names as password
Million-dollar deposits and friends in high places: how we applied for a job with a ransomware gang
During an undercover interview, a CyberNews researcher tricked ransomware operators affiliated with Ragnar Locker into revealing their ransom payout structure,...
Read more about Million-dollar deposits and friends in high places: how we applied for a job with a ransomware gang
Facebook Messenger users hit by scammers in over 80 states
Over 1,000 fake Facebook accounts were discovered in a large-scale scam aimed at Facebook Messenger users in over 80 countries...
Read more about Facebook Messenger users hit by scammers in over 80 states
Deterrence in cybersecurity is no longer enough. Here’s why
A new study from MIT argues that modern organizations require a more proactive approach to cybersecurity. When we think of...
Read more about Deterrence in cybersecurity is no longer enough. Here’s why
Scammers are capitalizing on our desire to get away
Watch out - malicious domains targeting travelling are on the rise. After more than a year of rolling lockdowns, and...
Read more about Scammers are capitalizing on our desire to get away
Over 380 thousand IP cameras might be easily accessible worldwide, with the US and Germany in the lead
Ubiquitous video surveillance has become the hallmark of the century, with millions of eyes behind billions of ever-present cameras constantly...
Read more about Over 380 thousand IP cameras might be easily accessible worldwide, with the US and Germany in the lead
Cybersecurity in a post-pandemic world
With mass vaccination ramping up and the possible end of the pandemic in sight, it’s time to look at how...
Read more about Cybersecurity in a post-pandemic world
Cheapest tool to kill satellites? A computer
Military presence in space is an expensive endeavor, usually reserved for wealthy nations. Countries lacking in resources, however, might employ...
Read more about Cheapest tool to kill satellites? A computer
“Not ideal” from a privacy standpoint: Clubhouse API lets “anyone” scrape public user data
According to Clubhouse, anyone can access its users' profile information via the invite-only app, while its API appears to allow...
Read more about “Not ideal” from a privacy standpoint: Clubhouse API lets “anyone” scrape public user data
Clubhouse data leak: 1.3 million scraped user records leaked online for free
So far, it seems like it’s been the worst week of the year for social media platforms in terms of...
Read more about Clubhouse data leak: 1.3 million scraped user records leaked online for free