Cybersecurity Blog
DePauw University warns of data breach as ransomware attacks on colleges surge
DePauw University warned students this week that their personal information may have been accessed by hackers who ...
P2Pinfect – New Variant Targets MIPS Devices – Cado Security | Cloud Forensics & Incident Response
Summary A new P2Pinfect variant compiled for the Microprocessor without Interlocked Pipelined Stages (MIPS) architecture ...
New BLUFFS Bluetooth Attack Expose Devices to Adversary-in-the-Middle Attacks
Dec 04, 2023NewsroomEncryption / Technology New research has unearthed multiple novel attacks that break Bluetooth ...
Fortune-telling website WeMystic exposes 13M+ user records
Fortune-telling website WeMystic exposes 13M+ user records Pierluigi Paganini December 02, 2023 WeMystic, a website on ...
Make a Fresh Start for 2024: Clean Out Your User Inventory to Reduce SaaS Risk
As work ebbs with the typical end-of-year slowdown, now is a good time to review user roles and privileges and remove ...
Bridging the gap between cloud vs on-premise security – Help Net Security
With the proliferation of SaaS applications, remote work and shadow IT, organizations feel obliged to embrace ...
New P2PInfect Botnet MIPS Variant Targeting Routers and IoT Devices
Dec 04, 2023NewsroomMalware / Botnet Cybersecurity researchers have discovered a new variant of an emerging botnet ...
New Proxy Malware Targets Mac Users Through Pirated Software
The proxy trojan connects to a command and control server via DNS-over-HTTPS and supports creating TCP or UDP ...