Ransomware operators made at least $350 million in ransom payments in 2020, according to a Chainalysis report. The figure was calculated by tracking transactions on blockchain addresses...
Walmart and Amazon are continuing to sell faulty smart doorbells and cameras filled with vulnerabilities that could expose customers’ sensitive information, according to research published Thursday....
Accounts operating under rare “O.G. user names” obtained through hacking were banned on Thursday after a monthslong investigation. Instagram is coordinating with other social media platforms,...
As many as 100,000 of the music streaming service’s customers could face account takeover. Spotify streaming music aficionados are in the crosshairs of yet another credential-stuffing...
Cerber was once the most common form of ransomware – and now it’s back, years after it’s heyday. A form of ransomware that was once the...
Criminal gangs often use multiple ransomware strains and jump ship from one RaaS (Ransomware-as-a-Service) to another, seeking better deals. A report published today by blockchain investigations...
A savvy phishing campaign manages to evade native Microsoft security defenses, looking to steal O365 credentials. A phishing campaign bent on stealing Microsoft login credentials is...
An Internet Explorer zero-day vulnerability has been discovered used in recent North Korean attacks against security and vulnerability researchers. Last month, Google disclosed that the North...
The modern IT organization has a wide variety of responsibilities and competing priorities. As a result, cybersecurity is often overlooked in favor of projects that have an immediate...
Belgian cybersecurity researcher Polle Vanhoof just published a fascinating and well-written paper about an exploitable hole he found in the payment system used in some Nespresso prepaid coffee...