Cybercrime rewards innovative organizations. These can innovate at the tactical level (e.g. new or updated tactics, techniques, and procedures (TTP)), the strategic level (e.g. new monetisation methods), or at the operational level—the management of resources and personnel to achieve strategic objectives. This is operational art. Source: okta… Read More


A spam group has picked up a pretty clever trick that has allowed it to bypass email filters and security systems and land in more inboxes than usual. The trick relies on a quirk inRFC791— a standard that describes the Internet Protocol (IP). Among the various technical details, RFC791 is also the standard that describes… Read More


Below you can find the most important security and privacy features your iOS device now has that it didn’t have before. Make sure you check them as soon as you’ve got iOS 14 on your iPhone or iPad. Apps on iOS have to explicitly ask for your permission to use the camera and microphone, and… Read More


Prosecutors allege the group paid handsome bribes to give clients a competitive advantage. According to the indictment, issued by a Grand Jury in the Western District of Washington, the six conspired to pay Amazon employees over $100,000 to secure an ‘unfair competitive advantage’ on Amazon Marketplace. The bribery bill is steep, but in return, the… Read More


The incident marks the first recorded casualty as a consequence of cyberattacks on critical healthcare facilities, which has ramped up in recent months. The attack, which exploited a Citrix ADCCVE-2019-19781vulnerability to cripple the hospital systems on September 10, is said to have been ‘misdirected’ in that it was originally intended for Heinrich Heine University, according… Read More


Updated Switzerland-based IT consultant Tillie Kottmann on Thursday published a trove of confidential Intel technical material, code, and documents related to various processors and chipsets. A spokesperson for Intel told us the information was likely taken from its Resource and Design Center, which is a private library of resources for computer manufacturers and the like… Read More


A Twitter hacking scheme that targeted political, corporate and cultural elites this week began with a teasing message between two hackers late Tuesday on the online messaging platform Discord.“yoo bro,” wrote a user named “Kirk,” according to a screenshot of the conversation shared with The New York Times. “i work at twitter / don’t show… Read More


The Senate Intelligence Committee wants the Director of National Intelligence and the Secretary of Defense to create a comprehensive, unclassified report concerning unidentified aerial phenomena upon the passing of a Senate appropriations bill initiated by Senator Marco Rubio, Motherboard has learned. A recent Senate Intelligence Committee report on the bill, which concerns funding the government’s… Read More


Malwarebytes experts observed crooks hiding a software skimmer in the EXIF metadata of an image that was surreptitiously loaded by compromised online stores. While investigating a Magecart attack, experts found an e-skimmer code hidden in the EXIF metadata of an image file and surreptitiously loaded by compromised online stores. The malicious script detected by the… Read More


The Islamic State of Iraq and Syria (ISIS) terrorist organization is reportedly moving away from Bitcoin (BTC) with ISIS-associated news website ditching the world’s oldest crypto and moving on with monero (XMR) as a currency of choice for public donations, claims blockchain intelligence company Whitestream. According to Whitestream, a website affiliated with the jihadist movement… Read More