Data Security
Apple Warns of ‘Mercenary Spyware Attacks’ on iPhone Users
Apple reportedly is alerting iPhone users in 92 countries that they may have been the targets of attacks using “mercenary spyware,” a term that the company is now using in such alerts ...
Security Boulevard
Demonstrating the Value of Data-Centric Security in Retail: Two Case Studies
The retail sector is undergoing profound changes to support digital commerce, personalization and automated buying experiences. It’s not hard to see why. In the US alone, e-commerce sales exceeded $1.1 trillion in ...
Data Detection and Response: Enhancing Threat Intelligence and Incident Response
Katrina Thompson | | Blog, data detection and response, data protection, DDR, Incident Response, Threat Intelligence
As data naturally lives and breathes, gets copied, shared, expanded, collaborated on, and distributed, the many lives of a single piece of information can be extraordinarily hard to keep track of, much ...
Ransomware-Proof Your Data Backups with Immutability
TechSpective Podcast Episode 130 Backing up data has been a fundamental requirement for IT since data began. In the age of ransomware, though, data backups have had a bit of a ...
Raspberry Robin Malware Now Using Windows Script Files to Spread
The threat actors behind Raspberry Robin are using highly sophisticated evasion techniques to stay under the radar of antivirus software ...
Security Boulevard
Watch This? Patch This! LG Fixes Smart TV Vulns
Richi Jennings | | BitDefender, bitdefender research, Consumer IoT, CVE-2023-6317, CVE-2023-6318, CVE-2023-6319, CVE-2023-6320, iot, LG, SB Blogwatch, Smart TV, Smart TV Security, Smart TV Vulnerability, Smart TVs, The ‘S’ in IoT stands for Security, TV, WebOS
4×CVE=RCE or Merely CE? Update your LG TV now, or let hackers root it. But is Bitdefender overhyping the issue? ...
Security Boulevard
Insider Threats Surge Amid Growing Foreign Interference
A surge in insider threats, amidst increasing foreign interference and sophisticated tactics, suggests the need for enhanced detection and mitigation strategies ...
Security Boulevard
FCC Mulls Rules to Protect Abuse Survivors from Stalking Through Cars
Jeffrey Burt | | automobile, automobiles, Car, connected car security, domestic abuse, fcc, government, MVNO, telematics
To protect domestic violence survivors from abusers, the FCC wants to include internet-connected vehicles under the Safe Communication Act ...
Security Boulevard
What is Session Hijacking?
Session hijacking is a prevalent and dangerous attack method frequently employed by cybercriminals to illicitly gain access and then take control of user accounts and systems. Session hijacking is a type of ...
PyPI Malicious Package Uploads Used To Target Developers
Wajahat Raja | | Check Point, Checkmarx, countermeasures, Cyber Threats, Cybersecurity, Cybersecurity News, data theft, Developer Security, digital assets, Malicious package uploads, Malware, online security, package management, persistence, Phylum, PyPI, risk mitigation, software supply chain, Typosquatting, Windows operating system
In light of the recent cybercriminal activity, new user sign-ups on the PyPI platform were halted. Currently, an increase in PyPI malicious package uploads is being deemed the reason behind the suspension ...