In late 2018, Czech law enforcement took down a Russian cyber espionage network set up by Russia’s intelligence agency (the FSB) and Russia’s embassy in Prague, the Czech government announced earlier this week. Russian spies had established a number of hardware and software firms in the country and used the
Software developer Retina-X Studio is no longer allowed to sell three of its apps designed for monitoring employees and children, because the “stalkerware” applications are often used by cybercriminals to spy on users without their consent, the US Federal Trade Commission (FTC) determined on Tuesday. The FTC wants the company
New research by Malwarebytes connects Magecart Group 5, one of the most prominent payment card skimming threat actors, to the notorious Carbanak threat group. Magecart is an umbrella term for various criminal groups that attack websites with the aim of injecting them with “skimming” malware designed to steal the payment
The personal and travel data of tens of thousands of people, including US government and military personnel, has been exposed by an unsecured database belonging to reservations management system Autoclerk, according to research by vpnMentor. More than 100,000 booking reservations were found on the leaky server, which contained over 179GB
People are most likely to fall for a phishing scam when it involves a fake message warning that their account has been hacked, a new report by KnowBe4 shows. In phishing simulations and actual phishing campaigns, the email headlines that were most successful in getting victim’s to click on malicious
A new study by the University of Cambridge and the University of Strathclyde suggests that preventive approaches to fighting cybercrime are far more promising than reactionary measures. The researchers found that arresting people who used “booter services” to carry out denial of service (DoS) attacks only resulted in short-terms drops
44% of US citizens believe that their personally identifiable information (PII) has been compromised in a data breach, a recent survey by 4iQ found. 63% of respondents worry that previous breaches may result in identity fraud at a later date, while 37% think they have already been targeted by fraudsters.
Chinese state-backed hackers have been using a malware tool that enables them to access Microsoft SQL Server (MSSQL) systems using a special password and subsequently maintain a presence on those systems without getting detected. The threat actor, known as APT 41, Winnti Group, Blackfly/Suckfly, Wicked Panda and BARIUM, has been
A threat actor has obtained access to servers belonging to NordVPN, TorGuard, and possibly VikingVPN. NordVPN acknowledged that it suffered a data breach in March of 2018 in which a threat actor obtained private keys used by the firm for securing its web servers as well as VPN configuration files.
A new HP survey exposes the ‘secret behaviors’ of US workers that undermine the privacy of others. For instance, 73% of employees engage in creeping, i.e. looking at the computer screen of a co-worker, while the same number of people look at documents they find in shared office printer trays.