Cloud Consultancy News
Dropbox Used to Mask Malware Movement in Cyberespionage Campaign
The IndigoZebra APT is targeting the Afghan government using Dropbox as an API that leaves no traces of communications with weirdo websites. Chinese-speaking cyberespionage actors have targeted the Afghan government, using Dropbox for command-and-control (C2)...
700 Million LinkedIn Records For Sale on Hacker Forum, June 22nd 2021
Things are not looking good for LinkedIn right now. Just two months after a jaw-dropping 500 million profiles from the networking site were put up for sale on a popular hacker forum, a new posting with 700 million LinkedIn records has appeared. The seller, “GOD User”...
Gamers suffer highest growth in cyberattacks during COVID pandemic
Cyberattack traffic targeting the video game industry grew more than any other industry during the COVID-19 pandemic, according to a new report. The Akamai State of the Internet / Security report, Gaming in a Pandemic, found the video game industry suffered more than...
Best practices for IT teams to prevent ransomware attacks
According to Check Point research, the number of organizations affected by ransomware has been growing at 9% monthly since the start of the year. From WannaCry, Petya, and SamSam to Ryuk, these ransomware attacks have caused huge financial and reputation losses for...
Apple AirTags can be used to track you. Here’s how to make that stop
AirTags can be used to stalk someone's location. Here are some tips for protecting yourself. Apple's new AirTag tracking devices promise to help you locate lost keys, bags or other items -- but what if someone uses one of the small discs to try to track you? While...
Microsoft to integrate Chat from Teams into Windows 11’s taskbar
The rumours were true. Not so long after introducing a Skype "Meet Now" button for Windows 10, Microsoft is replacing it with a Teams Chat button on the taskbar in Windows 11. Integrating Teams Chat on the taskbar is meant to help users more quickly start a chat or...
Smishing – what is it? And why should it be a top priority for CISOs?
Anyone who uses a smartphone has likely been the target of at least one smishing attack. Short for SMS phishing, smishing is an increasingly popular choice of attack vector, where the user is deceived into downloading virus or malware onto their mobile devices....
What is the real cost of ransomware?
Cybereason released research findings from a global ransomware study of nearly 1,300 security professionals that reveals more than half of organizations have been the victim of a ransomware attack, and that 80 percent of businesses that chose to pay a ransom demand...
iPhone bug makes it easy for someone to break your Wi-Fi. Here’s the fix and how to prevent it
Connecting to a Wi-Fi hotspot with a specific name can cause your iPhone's Wi-Fi functionality to break, and even a reboot won't fix it. The bug, spotted by reverse engineer Carl Schou and first reported by Bleeping Computer relies on attempting to connect to a...
What happens to email accounts once credentials are compromised?
Agari researchers entered unique credentials belonging to fake personas into phishing sites posing as widely used enterprise applications, and waited to see what the phishers would do next with the compromised accounts. They found that 23% of all accounts were...