Pig butchering scams: The anatomy of a fast-growing threat
How fraudsters groom their marks and move in for the kill using tricks from the playbooks of romance and investment scammers
Read MoreHow fraudsters groom their marks and move in for the kill using tricks from the playbooks of romance and investment scammers
Read MoreSimilarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack
Read Moreby Paul Ducklin If you’d been quietly chasing down cryptographic bugs in a proprietary police radio system since 2021, but you’d had to wait until the second half of 2023 to go public with your research, how would you deal with the reveal? You’d probably do what researchers at boutique Dutch cybersecurity consultancy Midnight Blue did: line up a world tour of conference appearances in the US, Germany and Denmark (Black Hat, Usenix, DEF CON,…
Read MoreData privacy and governance provider OneTrust today announced that it has raised $150 million in new funding, bringing the total raised by the company to over $1 billion. Founded in 2016, the Atlanta-based firm offers a trust intelligence platform to help organizations visualize the data entering their environment, manage it, meet compliance requirements, and ensure transparency. According to OneTrust, its privacy and security compliance tools are suited for small to large organizations, delivering a holistic…
Read MoreAs the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the cyber-resilience of critical infrastructure have never been more vital
Read MoreDon’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves – and your entire organization
Read MoreA roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet
Read MoreNobody wants to spend their time dealing with the fallout of a security incident instead of building up their business
Read MoreA peek under the hood of a cybercrime operation and what you can do to avoid being an easy target for similar ploys
Read MoreResponses generated by ChatGPT about individual people could be misleading or harmful or spill their personal information. What are the takeaways for you as a ChatGPT user?
Read More