Cybersecurity Blog
Google Warns How Hackers Could Abuse Calendar Service as a Covert C2 Channel
Nov 06, 2023NewsroomCyber Attack / Online Security Google is warning of multiple threat actors sharing a public ...
Socks5Systemz Proxy Botnet Infects 10,000 Systems Worldwide
The botnet uses a domain generation algorithm (DGA) to connect with its command and control server and can be instructed ...
Apple ‘Find My’ Network can be Abused to Steal Keylogged Passwords
Researchers at Positive Security demonstrated that by integrating a keylogger with a Bluetooth transmitter into a USB ...
Google Play Store Highlights ‘Independent Security Review’ Badge for VPN Apps
Nov 04, 2023NewsroomMobile Security / Android Google is rolling out a new banner to highlight the “Independent ...
Russia’s 2nd-Largest Insurer Rosgosstrakh Hacked; 400GB of Data Sold Online
An analysis of the sample data shared by the hackers revealed, among other details, personal and insurance-related ...
Iranian Hackers Launches Destructive Cyberattacks on Israeli Tech and Education Sectors
Nov 06, 2023NewsroomCyber War / Malware Israeli higher education and tech sectors have been targeted as part of a ...
Healthcare Data Breaches Impact 88 Million Americans This Year
Threat actors have compromised sensitive health data on tens of millions of US patients so far this year, according to ...
LEGO Marketplace BrickLink Hacked? Website Down Amid Unusual Activity
Key Points The official website of BrickLink displays a message stating that it experienced unusual activity. Ransom ...