Features

Menlo Security web domain browser SaaS credentials, attack, cybercriminals INKY web credentials Shodan EV certificates

Menlo Security Adds SaaS Platform to Manage Secure Browsers

Menlo Security's SaaS platform applies and manages cybersecurity policies to secure Google Chrome or Microsoft Edge browsers ... Read More
EU TikTok investigation

EU Opens Official Probe of TikTok Over Content, Minors, Privacy

The European Commission is once again turning its attention to TikTok, announcing a wide-ranging investigation into the China-based social media site over concerns about the addictive nature of its site and content, possible harm to minors, and data privacy. The probe will determine whether TikTok is in violation of the ... Read More
Wyze connected camera

About 13,000 Wyze Customers Affected by Camera Glitch

Users of Wyze’s home security cameras over the past several days have reported glitches with the internet-connected devices, from losing camera coverage for hours to being able to see images and video from other people’s cameras. It turns out the problem originated from cloud giant Amazon Web Services (AWS), a ... Read More
spyware NSO pegasus Ransomware

NSO Group and Its ‘MMS Fingerprint’ Attack

| | MMS, NSO Group, Pegasus Spyware
Buried among the piles of legal documents that form WhatsApp’s five-year-old lawsuit against NSO Group is a line in a contract that exposes a mobile network attack dubbed “MMS Fingerprint,” a tactic for infecting mobile devices that was used by NSO. The technique was unearthed by a researcher at Swedish ... Read More
Google AI cybersecurity

Google Initiative Aims to Boost AI for Cybersecurity

Google is pushing AI as the technology that will shift the balance of power from cyberattackers to security professionals and is launching a new project to make that a reality. The AI Cyber Defense initiative is the tech giant’s latest effort to leverage AI for cybersecurity and to reverse the ... Read More
KillNet Web3 CrowdStrike threats Web Apps Reveals Security Threats

Data Security: Beyond Threat Hunting to Monitoring Data Flow and User Behavior

Cybersecurity is moving from conventional threat detection to a strategy that emphasizes context and preempts user behavior to detect anomalies ... Read More
BlackCat ransomware reward

US Offers $10M for Info on BlackCat/ALPHV Ransomware Leaders

A week after offering a $10 million reward for information about the leaders of the Hive ransomware group, the U.S. government is turning its attention – and financial power – to the notorious Russia-linked BlackCat gang. The State Department this week announced a reward of up to $10 million for ... Read More
smishing USPS scam

With SNS Sender, USPS Smishing Scams Move to the Cloud

Given how many organizations continue to move their workloads to the cloud, it’s not surprising that bad actors are doing the same. The latest example comes from attackers who are using Amazon Web Services’ Simple Notification Service (SNS) in a “smishing” scam that includes impersonating the U.S. Postal Service (USPS) ... Read More