Luca Stealer malware spreads rapidly after code shared on forum
A rust-based malware named Luca Stealer spread rapidly after its source code was published on a cybercrime forum.
The data-stealing malware is programmed in Rust. Dubbed 'Luca Stealer', the malware was first shared at the beginning of July. The developer posted the code on a cybercrime forum and... Read more
Stytch unveils Passwords, a tool that helps transition to passwordless
Stytch introduced a new password-based authentication solution. According to the company, a whopping 85 percent of IT and security experts don't believe passwords are entirely going away just yet.
Stytch develops an API-first authentication platform. Over the past two years, the company focused ... Read more
Microsoft goes on the offensive in Europe to combat cloud concerns
Microsoft is attempting to sway organizations into dropping antitrust complaints by offering collaborations and marketing promotions.
A lawyer for cloud computing company Nextcloud recently presented the European Commission with an antitrust complaint against Microsoft. Nextcloud accused Micros... Read more
Cisco focuses on integrations and as-a-service in simplification push
More integrations between different parts of Cisco's extensive portfolio in networking and security, combined with as-a-service consumption models meant to make customers' lives a lot easier.
For years, Cisco events were mainly about adding new features, products, services and often entire acqui... Read more
Fraudulent Android apps can disable wifi and sign contracts
A new generation of Android scamware employs several tricks to register users to costly services.
According to Microsoft, Android malware developers have stepped up their billing fraud games with applications that disable WiFi connections, covertly subscribe individuals to costly wireless servic... Read more
Google blocks over thirty malicious domains used by hackers
Google blocked over thirty malicious domains connected to cybercriminal groups in Russia, UAE and India.
The domains actively targeted AWS, Gmail and many other personal accounts to perform corporate espionage against organizations and human activists.
According to the threat analysis group a... Read more
Google Cloud Armor adds rate limiting to combat DDoS attacks
In light of recent attacks against cloud-based users, Google added new capabilities to Cloud Armor.
In a recent blog post, Google stated that modern cyberattacks use increasingly comprehensive techniques like volumetric floods, bot-based attacks, API abuse and DDoS attacks.
Google Cloud Armor... Read more
Windows 11’s new privacy feature highlights apps that spy on you
Microsoft introduced a new privacy feature that indicates which applications access sensitive devices and data.
Microsoft Windows 11's is similar to Apple iOS's Privacy Auditing. Both features shows the history of all apps' access to sensitive devices and data like microphones and location histo... Read more
Panchan malware spreads across networks through Linux servers
The peer-to-peer Panchan malware spreads throughout educational institutes using Linux servers to mine cryptocurrencies.
Discovered by Akamai researchers in March, the virus spreads using stolen SSH keys and operates its cryptomining malware in devices' memory. Instead of stealing intellectual p... Read more
NetApp offers new features in hybrid multi-cloud
NetApp has included advanced ransomware protection and single subscription features in its hybrid multi-cloud services. On top of this, they have offered closer cooperation with VMware and a unified user interface for easier accessibility.
“With NetApp’s simplified management and consumption... Read more