DeFi was the most attacked ecosystem in 2022: Finance Redefined
Welcome to Finance Redefined, your weekly dose of essential decentralized finance (DeFi) insights — a newsletter crafted to bring you significant developments over the last week.The DeFi ecosystem started...
Malware Comes Standard With This Android TV Box on Amazon
At $39.99 with a $3 coupon option for Amazon Prime members, the T95 Android 10.0 TV box might seem like a good value. But when an unsuspecting but cybersecurity-savvy...
Crawl, Walk, Run: Operationalizing Your IaC Security Program
You’ve decided to shift your cloud security left. You researched vendors, evaluated solutions, did a proof of concept and now you’re off the IaC security races.
You know what your...
Sneaky New Stealer Woos Corporate Workers Through Fake Zoom Downloads
A sneaky new info stealer is sliding onto user machines via website redirects from Google Ads that pose as download sites for popular remote-workforce software, such as Zoom and...
Here’s how to quickly spot a deepfake crypto scam — cybersecurity execs
Crypto investors have been urged to keep their eyes peeled for “deepfake” crypto scams to come, with the digital-doppelganger technology continuing to advance, making it harder for viewers to...
$20K Buys Insider Access to Telegram Servers, Dark Web Ad Claims
For the non-negotiable price of $20,000, threat actors claim they can provide insider access to Telegram servers running the encrypted instant messaging platform preferred by a security-conscious clientele.The ad,...
Researchers Find ‘Digital Crime Haven’ While Investigating Magecart Activity
Cybercriminals engaged in one form of criminal activity can sometimes have their hands in a wide range of other nefarious campaigns as well, as researchers recently discovered when analyzing...
Report: Illicit cryptocurrency activity reached all-time high in 2022
Written by Tonya Riley Jan 12, 2023 |...
Big Prizes, Cash on Offer for Joining ‘DDosia’ Anti-Ukraine Cyberattack Project
A Russian threat group is offering incentives and cryptocurrency prizes in an effort to recruit Dark Web volunteers — who it calls "heroes" — to its distributed denial-of-service (DDoS) cyberattack ring.A...
Critical Cisco SMB Router Flaw Allows Authentication Bypass, PoC Available
Two security vulnerabilities in Cisco routers for small and mid-sized businesses (SMBs) could allow unauthenticated cyberattackers to take full control of a target device to run commands with root...