Discord tokens are being targeted by malicious npm packages
Packages were removed before being extensively downloaded to target Discord users......»»
Exchange Online will soon start blocking emails from old, vulnerable on-prem servers
Slowly but surely, Microsoft aims to make it impossible for unsupported and/or unpatched on-prem Microsoft Exchange servers to use the company’s Exchange Online hosted cloud service to deliver email. Blocking potentially malicious emails from r.....»»
Hybrid micro-robot able to navigate in physiological environment, capture targeted damaged cells
Researchers at Tel Aviv University have developed a hybrid micro-robot, the size of a single biological cell (about 10 microns across), that can be controlled and navigated using two different mechanisms—electric and magnetic. The micro-robot is ab.....»»
Watch out — those IRS tax forms could actually just be malware
Two new malicious campaigns recently spotted impersonating IRS tax forms......»»
McAfee and Mastercard expand partnership to improve security for small businesses
McAfee has expanded partnership with Mastercard to offer Mastercard Business cardholders automatic savings on online protection solutions from McAfee through Mastercard Easy Savings. According to the latest FBI Internet Crime Report, malicious cyber.....»»
CISA releases free tool for detecting malicious activity in Microsoft cloud environments
Network defenders searching for malicious activity in their Microsoft Azure, Azure Active Directory (AAD), and Microsoft 365 (M365) cloud environments have a new free solution at their disposal: Untitled Goose Tool. Released by the Cybersecurity and.....»»
Using targeted computer modeling to accelerate antiviral drug development
Effective drugs against viral diseases like COVID-19 are urgently needed now and in the future. The emergence of viral mutants and yet unknown viruses could push vaccines to their limits......»»
The U.S. government is now using AirTag trackers to spy on packages
Apple launched the AirTag to help track your bag or keep an eye on pets. Law enforcement agencies are now using it to clamp down on drug operations......»»
An AirTag helped the DEA in a narcotics investigation
A search warrant has revealed how the Drug Enforcement Agency used an AirTag in an investigation, the first federal agency known to do so.AirTags can be used for good or illIn May 2022, border agents seized two packages from Shanghai, China. Inside o.....»»
Mobile stalkerware is becoming a bigger threat than ever before
Malicious tracking apps have surged in the last three years, new figures from Avast are showing......»»
Verosint SignalPrint identifies potentially malicious accounts
Verosint announced a new solution that helps organizations secure their online businesses and protect their customers in the face of ever-growing account fraud. With Verosint, companies can deliver frictionless access to legitimate customers, while b.....»»
2022 witnessed a drop in exploited zero-days
Malicious threat actors have actively exploited 55 zero-days in 2022 – down from 81 in 2021 – with Microsoft, Google, and Apple products being most targeted. 53 out of 55 allowed attackers to achieve elevated privileges or execute remote.....»»
Threat actors are experimenting with QR codes
Hackers are diversifying attack methods, including a surge in QR code phishing campaigns, according to HP. From February 2022, Microsoft began blocking macros in Office files by default, making it harder for attackers to run malicious code. Data coll.....»»
Ferrari customers targeted in ransom-related cyberattack
Ferrari has been targeted by a hacker who is threatening to release data linked to its customers unless the automaker hands over a ransom payment......»»
SVB account holders targeted with phishing, scams
After news broke late last week about Silicon Valley Bank’s bank run and collapse, security researchers started warning SVB account holders about incoming SVB-related scams and phishing attempts. Another reminder: just because caller ID says FD.....»»
Tracking the global spread of malware
Approximately 10-16 percent of organizations have shown evidence of malicious command and control (C2) activities, strongly indicating a network breach within the last year, according to Akamai. Emotet and QSnatch Akamai observes nearly seven trillio.....»»
BIgID’s secrets detection capabilities reduce risk from potential data breaches and leaks
BigID has introduced purpose-built AI and ML-based data discovery and classification capabilities designed to detect secrets across enterprise data and reduce risk from potential data breaches and leaks. Secrets – including as API keys, tokens,.....»»
Protein engineers navigate toward more targeted therapeutics
More than a third of FDA-approved drugs work by targeting a G protein-coupled receptor, or GPCR. The human body has more than 800 types of GPCRs that provide cells with information about the external environment to calibrate responses. Drugs that eit.....»»
Fortinet flaws are being exploited in attacks on government
Attackers with "advanced capabilities" are exploiting FortiOS flaws in "highly targeted" events......»»
Best practices for securing the software application supply chain
As server-side security advances, more attackers are exploiting vulnerabilities and launching malicious attacks through the less protected and seldom monitored client-side supply chain. Unfortunately, because of these attacks’ sophisticated and.....»»
Discord promises outraged users it won’t store call recordings—for now
Discord staff promises shocked Reddit users, "We are going to fix this." Enlarge (credit: Bloomberg / Contributor | Bloomberg) Before it was updated last month, Discord’s privacy policy specifically promised to alert u.....»»