Eskenzi PR ad banner Eskenzi PR ad banner

News

North Korea flags

Cybersecurity firm Volexity spotted new activity from a threat actor (TA) allegedly associated with North Korea and deploying malicious extensions on Chromium-based web browsers. The threat has been dubbed SharpTongue by security researchers, despite it being publicly referred to under the name Kimsuky. The researchers frequently observed the TA targeting individuals working for organisations in the US, Europe and South Korea. The TA would reportedly victimise individuals and companies who work on topics including weapons...

Read more
blue logo that reads 'searchlight'

Searchlight Security, the dark web intelligence company, has announced a new automated reporting function for their dark web monitoring solution DarkIQ. The new reporting function will help security teams and MSSPs communicate pre-attack intelligence to executives, quickly and efficiently. The DarkIQ platform is a powerful dark web monitoring solution that utilises the most comprehensive dark web dataset on the market. It is the only dark web monitoring tool that keeps track of web traffic to and...

Read more
Hands on laptop keyboard

A 24-year-old Australian national has been charged for his purported role in the creation and sale of spyware for use by child sex offenders and domestic violence perpetrators. Jacob Wayne John Keen, from Melbourne, is said to have created the remote access trojan (RAT) when he was 15, alongside working as an administrator for the tool from 2013 until it was shutdown in 2019 by the authorities. The Australian Federal Police (AFP) alleged in a...

Read more

If you are on a limited internet plan, it would be wise to monitor your network traffic to know the apps that consume a large volume of data. iOS devices are fast and tend to auto-refresh apps and load high-quality websites and images. These can strain your internet plan and make it finish earlier than expected. Some might think turning off your data connection at every opportunity is an easy fix, but it is not...

Read more
Coloured lines on a screen

Cybersecurity researchers have uncovered a large network of more than 11,000 domains used to promote numerous fake investment schemes to users in Europe. The platforms show fabricated evidence of falsified celebrity endorsements and enrichment to create an image of legitimacy and attract a large number of victims. The operation's goal was to trick users into an opportunity for high-return investments and to convince victims to deposit a minimum amount of 250 EUR to sign up...

Read more
Gavel

Lawmakers on the Hill revealed last week that a cyber-attack on the US justice system had compromised a public document management system. Jerrold Nadler (D-NY),  chairman of the House Judiciary Committee, revealed the discovery at a hearing on oversight in the Justice Department. Nadler disclosed that three hostile actors had breached the Public Access to Court Electronic Records and Case Management/Electronic Case File (PACER) system, which provides access to documents across the US court system. Nadler...

Read more
chairs lined up in a row, school

Wooton Upper School in Bedfordshire suffered a ransomware attack this week, with hackers demanding £500,000 in ransom, according to reports. The attack also affected the Kimberley college for 16-19 year olds, with both members of the Wootton Academy Trust. The attack was said to be the work of the Hive ransomware group. The cybercriminals messaged parents and students to inform them of the compromise. Bank details, medical records, home addresses and psychological reviews were stolen...

Read more

As competition becomes fiercer, with technology being a primary tool for attaining competitive advantage, migrating to the cloud has become inevitable. Besides levelling the playfield, cloud technologies are a future-ready solution that makes running a business simpler and safer. Here, we look at five benefits of moving to the cloud. 1.   Improved security The cloud is designed for maximum data security, thanks to high levels of encryption and security layers that give it an edge...

Read more
Two men at work

Microsoft has linked the efforts of the threat group Knotweed to an Austrian spyware vendor. The group has so far used the malware dubbed 'SubZero' to attack groups in Europe and Central America. The Subzero malware, as used by Knotweed, can be used to hack a target's phone, computers, network, and internet-connected devices. DSRIF markets itself as a company that provides information research, forensics, and data-driven intelligence services to corporations. Yet, Microsoft has found multiple...

Read more
Doctor holding phone

A new report from GlobalData estimates that up to 22 million US health records have been breached so far in 2022. The same report forecasts that spending on cybersecurity in the global healthcare industry will increase by nearly $400 million in the next 3 years. This increase is sorely needed in a sprawling industry which is so often behind the times in terms of information security. The health care industry is often a prime target...

Read more
Page 24 of 364 1 23 24 25 364