European decision on data-sharing between Facebook and Whatsapp is coming
Ireland’s Data Protection Commission (DPC) announced on Saturday that the long-running investigation of Facebook and WhatsApp's conduct in the European Union, concerning transparency of data-sharing between the two platforms, is headed for a resolution.
In what many are saying is a significant...
NSA warns against using external DNS over HTTPS services
DNS encryption offers some advantages but also brings risks if left to third party providers, according to the agency.
The US National Security Agency (NSA) has published a guide on the benefits and risks of encrypted DNS protocols, such as DNS-over-HTTPS (DoH), which have become widely used ove...
Hackers use Covid-19 vaccine to spread malware
Security researchers have uncovered a new phishing campaign that uses the Covid-19 pandemic vaccine news to spread malware and Business Email Compromise (BEC) attacks. The attacks target people in businesses by pretending to be organizations involved in the manufacture of vaccines, the WHO, and DHL...
Threat detection startup MistNet acquired by LogRhythm
LogRhythm announced on Wednesday that it had bought the threat detection startup MistNet.IO. The terms of the deal were not disclosed. LogRhythm is a security intelligence firm, and MistNet deals with threat detection and prevention to minimize cybersecurity risks, making this a valuable deal.
M...
Social media platform Parler may never come back online
John Matze, the CEO of Parler says that the social media platform may never get back online after it was cut off by major service providers that were displeased by the app's failure to police violent content posted by its users.
Several business vendors cut off ties with the platform, which is o...
MacOS malware with crypto miner remained undiscovered for years
In the last five years (perhaps more), macOS users have been targeted by a sneaky malware operation, which used a clever trick, making it virtually invisible, while hijacking hardware resources on infected machines to mine cryptocurrency.
The malware has been distributed in the wild since at lea...
Google reports about complex Windows and Android hacking scheme
Google published a report in six parts, detailing how a complex hacking operation detected in early 2020 worked. The campaign targeted Android and Windows devices. The attacks were executed using two exploit servers that targeted different exploit chains, deploying watering hole-style attacks.
O...
Mimecast for Microsoft 365 hacked
Mimecast, a company dedicated to the management and security of Microsoft 365 products, has announced that one of its security certificates has been the target of a cyber attack.
The company said in a blog post that about 10 percent of its customers were using the compromised certificate. Less t...
Microsoft fixes Defender’s zero-day vulnerability on Patch Tuesday
Microsoft’s latest monthly security patches came out on Patch Tuesday, with the fix for Defender’s zero-day included. January's updates patch a total of 83 vulnerabilities, spread out over a wide range of Microsoft's products. They include cloud-based offerings, the Windows OS, Enterprise Serve...
100,000 United Nations employees exposed after a data breach
The United Nations was attacked, with details of more than 100,000 U.N. Environmental Program employees compromised. But there’s a twist; the breach was uncovered by White Hat hackers.
The ethical hacking and security research group Sakura Samurai, probed several U.N. databases after finding o...
Microsoft updates Sysmon to better defend against malware attacks
This latest update is notable in helping admins defend against malware attacks.
Microsoft has announced a new release of their Sysinternals package. As part of the release, they have updated the Sysmon utility with the ability to detect Process Herpaderping and Process Hollowing attacks.
Sysm...
Cybercriminals target top executives to force ransom payment
Ransomware gangs are now going after top executives, they aim to get access to their laptops and workstations to steal data from them, in the hope that what they find will be more valuable and hopefully pressure the companies involved to pay a ransom.
This trend is relatively new and operates on...