Skip to content

Digital ERA

  • Home
  • Digital Updates
  • Cyber Security

Author:

  • Home
  • Page 13
Cyber Security

Weekly Update 433

It sounds easy – "just verify people's age before they access the service" – but whether we're talking about porn in the US or Australia's

Read More
Cyber Security

Fake CrowdStrike Job Interviews Become Latest Hacker Tactic

NEWS BRIEF Cybercriminals have picked up a new tactic, impersonating CrowdStrike recruiters in order to distribute a cryptominer on their victims’ devices. This malicious campaign

Read More
Cyber Security

Was ist Social Engineering? | CSO Online

Social Engineering – Techniken Social Engineering hat sich für Cyberkriminelle als besonders erfolgreich erwiesen, wenn es darum geht in Unternehmen einzudringen. Sobald ein Angreifer das

Read More
Cyber Security

U.S. Army Soldier Arrested in AT&T, Verizon Extortions – Krebs on Security

Federal authorities have arrested and indicted a 20-year-old U.S. Army soldier on suspicion of being Kiberphant0m, a cybercriminal who has been selling and leaking sensitive

Read More
Cyber Security

Honey in hot water, and reset your devices • Graham Cluley

Ever wonder how those “free” browser extensions that promise to save you money actually work? We dive deep into the controversial world of Honey, the

Read More
Cyber Security

WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables

Cybersecurity researchers are warning of a new stealthy credit card skimmer campaign that targets WordPress e-commerce checkout pages by inserting malicious JavaScript code into a

Read More
Cyber Security

Analyzing the infamous infostealer’s backend

UPDATE (November 12th, 2024): We clarified the information in the fourth paragraph to better reflect RedLine’s functionality before versus after the takedown. On October 28th,

Read More
Cyber Security

Weekly Update 434

This week I'm giving a little teaser as to what's coming with stealer logs in HIBP and in about 24 hours from the time of

Read More
Cyber Security

Threat Actors Exploit a Critical Ivanti RCE Bug, Again

A Chinese threat actor is once again exploiting Ivanti remote access devices at large. If you had a nickel for every high-profile vulnerability affecting Ivanti

Read More
Cyber Security

Payback-CISO: „Vorbereitung ist das A und O“

Payback Welches Thema ist aus Ihrer Sicht aktuell das wichtigste in Sachen Cybersicherheit? Sayed: Es gibt sicherlich mehrere relevante Themen, aber Informationssicherheit basiert nach wie

Read More

Posts pagination

Previous 1 … 12 13 14 … 18 Next

Recent Posts

  • Why system resilience should mainly be the job of the OS, not just third-party applications
  • Second BeyondTrust Vulnerability Added to KEV Catalog
  • Die Top 10 Geschäftsrisiken in Deutschland 2025
  • AI’s deliberate deceptions, and Elon’s “unhinged” mode • Graham Cluley
  • Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool
All Rights Reserved 2024.
Proudly powered by WordPress | Theme: Fairy by Candid Themes.