Fake trading apps on Google Play and Apple’s App Store lure victims into “pig butchering” scams that have a global reach. […]
Dutch Police: ‘State actor’ likely behind recent data breach
The national Dutch police (Politie) says that a state actor was likely behind the data breach it detected last week. […]
Microsoft and DOJ disrupt Russian FSB hackers’ attack infrastructure
Microsoft and the Justice Department have seized over 100 domains used by the Russian ColdRiver hacking group to target United States government employees and nonprofit organizations from Russia and worldwide in spear-phishing attacks. […]
Microsoft, DOJ Dismantle Domains Used by Russian FSB-Linked Hacking Group
The coordinated action resulted in the seizure of more than 100 domains used for spear-phishing targets in the US, UK, and Europe.
The post Microsoft, DOJ Dismantle Domains Used by Russian FSB-Linked Hacking Group appeared first on SecurityWeek.
Over 4,000 Adobe Commerce, Magento shops hacked in CosmicSting attacks
Approximately 5% of all Adobe Commerce and Magento online stores, or 4,275 in absolute numbers, have been hacked in “CosmicSting” attacks. […]
Android 14 Adds New Security Features to Block 2G Exploits and Baseband Attacks
Google has revealed the various security guardrails that have been incorporated into its latest Pixel devices to counter the rising threat posed by baseband security attacks.
The cellular baseband (i.e., modem) refers to a processor on the device that’s responsible for handling all connectivity, such as LTE, 4G, and 5G, with a mobile phone cell tower or base station over a radio interface.
“This
The cellular baseband (i.e., modem) refers to a processor on the device that’s responsible for handling all connectivity, such as LTE, 4G, and 5G, with a mobile phone cell tower or base station over a radio interface.
“This
Fraudsters imprisoned for scamming Apple out of 6,000 iPhones
Two Chinese nationals were sentenced to prison for scamming Apple out of more than $2.5 million after exchanging over 6,000 counterfeit iPhones for authentic ones. […]
Cloudflare blocks largest recorded DDoS attack peaking at 3.8Tbps
During a distributed denial-of-service campaign targeting organizations in the financial services, internet, and telecommunications sectors, volumetric attacks peaked at 3.8 terabits per second, the largest publicly recorded to date. The assault consisted of a “month-long” barrage of more than 100 hyper-volumetric DDoS attacks flood. […]
CISO Salary Surge: Fewer Job Changes, Bigger Paychecks for Experienced Cybersecurity Leaders
CISO salaries are getting higher and experience counts. Average annual compensation for these cybersecurity leaders is more than $550K.
The post CISO Salary Surge: Fewer Job Changes, Bigger Paychecks for Experienced Cybersecurity Leaders appeared first on SecurityWeek.
The Secret Weakness Execs Are Overlooking: Non-Human Identities
For years, securing a company’s systems was synonymous with securing its “perimeter.” There was what was safe “inside” and the unsafe outside world. We built sturdy firewalls and deployed sophisticated detection systems, confident that keeping the barbarians outside the walls kept our data and systems safe.
The problem is that we no longer operate within the confines of physical on-prem
The problem is that we no longer operate within the confines of physical on-prem
