Two eagle-eyed Irish citizens have denied scammers a golden phishing opportunity after spotting a typo in the URL for Ireland’s new Covid-19 recovery certificate portal and registering the...
Microsoft has released mitigations for the new PetitPotam NTLM relay attack that allows taking over a domain controller or other Windows servers. PetitPotam is a new...
Attacks on OT – hardware and software that monitors or controls equipment, assets and processes – have become more common. Amid the fast-changing security arrangement around...
Vade released its Phishers’ Favorites report for H1 2021, which revealed that there has been a major jump in phishing attacks since the start of the year with...
The report notes that other security teams have discovered large-scale cryptocurrency mining attacks against Kubernetes clusters. Analysts with cybersecurity company Intezer have found that cybercriminals are...
Google says the latest version of Chrome detects phishing scams 50 times faster than its predecessor. This dramatic improvement means users of Chrome 92, which was released on Tuesday...
Threat actors are abusing misconfigured Argo Workflows instances to deploy cryptocurrency miners on Kubernetes (K8s) clusters. Kubernetes is an open-source system that helps to automate the deployment, scaling, and management...
Following the recent hack of Colonial Pipeline, the US Department of Homeland Security (DHS) has issued a new security directive requiring critical pipelines to implement tighter security...
US authorities are offering up to $10 million in cryptocurrency for information leading to the identification of state-sponsored cyber-attackers. Under the scheme, which takes place under the Department...
Insider data breaches were the top cause of data and cybersecurity incidents reported in the first quarter of 2021, according to the ICO. 57% of reported incidents...