Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Trezor crypto wallets under attack in SMS phishing campaign

Willie Sutton, the criminal who became legendary for stealing from banks during a forty year career, was once asked, "Why do you keep robbing banks?" His answer? "Because that's where the money is." However, today there's a better target for robbers today than banks, which are typically well-defended against theft... Cryptocurrency wallets.

Traveling with OAuth - Account Takeover on Booking.com

OAuth (Open Authorization) is a modern, open authorization standard designed to allow cross-application access delegation – for example, allowing your application to read data from your Facebook profile. Combined with the proper extensions, OAuth can also be used for authentication – for example, to log into your application using Google credentials. Since its first introduction in 2006, OAuth has gained tremendous popularity.

PyPI Packages Used to Deliver Python Remote Access Tools

As part of a project to obtain more awareness of initial attack vectors outside of the common phishing and web application exploitation, Kroll’s Cyber Threat Intelligence team has developed a tool to enable the enhanced monitoring of the Python Package Index (PyPI) to find and obtain malicious packages that are added to it.

Social Engineering: Definition & 6 Attack Types

We all know about the attacker who leverages their technical expertise to infiltrate protected computer systems and compromise sensitive data. This type of malicious actor ends up in the news all the time. But they’re not the only ones making headlines. So too are “social engineers,” individuals who use phone calls and other media to exploit human psychology and trick people into handing over access to the organization’s sensitive information.

The Simply Cyber Report - February 28, 2023

GoDaddy, the website builder and hosting provider, disclosed on February 16th, in a 10-K U.S Securities and Exchange Commission (SEC) filing that three separate security events, suspected to be orchestrated by the same threat actor, had occurred. Twitter has recently announced that it will be limiting the use of SMS-based two-factor authentication (2FA) to its Blue subscribers.

The 10 Most Common Website Security Attacks (and How to Protect Yourself)

They’re far from old news: despite the hype about “increasingly sophisticated, automated attacks,” these 10 tried-and-true website security attacks are still top of the list for career malicious hackers. No one likes to work harder than they have to, and black hats are no different. Why repel from the ceiling when you could just try the front door?

9 Ways Cyber Attackers are Looking to Exploit Government Agencies in 2023

Governments play a key role in the continued operation of society. While getting a speeding ticket or paying taxes may not be anyone’s favorite thing to do, they contribute to the government’s ability to protect its citizens while maintaining its infrastructure and services. Cybersecurity is critical for all organizations and government agencies, as they may hold sensitive information on both individuals, as well as key infrastructure.

How Executives Can Stay Safe From Cyberattacks

The C-Suite and other senior executives are frequently the targets of cyberattacks. As the most visible members of an organization, executives have access to sensitive information, influence inside the organization and a public platform, making them valuable targets for cybercriminals. Organizations of all sizes need to actively reduce risk for senior management.