Phorpiex Botnet Sending 30,000 Sextortion Emails an Hour
Oct18

Phorpiex Botnet Sending 30,000 Sextortion Emails an Hour

Sextortion may be nothing new, but it has certainly proven popular with cybercriminals in recent months. Sextortion emails threaten to expose sordid details of the activities of their victims unless payment is made. One of the most common scams claims that the sender of the email is a hacker who has hijacked the victim’s webcam and recorded footage of a user viewing pornography. The supposed hacker claims to have also recorded the...

Read More
Only 32% of Companies are Adopting a Security-First Approach to Cloud Data Storage
Oct17

Only 32% of Companies are Adopting a Security-First Approach to Cloud Data Storage

A recent survey conducted by the Poenmon Institute has revealed less than a third (32%) of companies are adopting a security-first approach to data stored in the cloud. The survey was conducted for the 2019 Thales Global Cloud Security Study on 3,000 IT and IT security professionals in 8 countries – Australia, Brazil, France, Germany, India, Japan, the UK and the US. The survey revealed 48% of corporate data is now stored in the...

Read More
Research Universities Targeted by ‘Silent Librarian’ Hacking Group
Oct16

Research Universities Targeted by ‘Silent Librarian’ Hacking Group

The start of the academic year has seen the Silent Librarian (TA407) hacking group launch new phishing campaigns targeting research universities. The hacking group is believed to be backed by the Iranian government and is highly active at the start and end of an academic year. The campaigns were detected by security researchers at Proofpoint and Secureworks, who intercepted several emails containing hyperlinks to malicious websites...

Read More
Adobe October Update Includes Patches for 45 Critical Vulnerabilities in Acrobat and Reader
Oct16

Adobe October Update Includes Patches for 45 Critical Vulnerabilities in Acrobat and Reader

Adobe usually releases its patches, fixes, and software updates on the same day as Microsoft – The second Tuesday of the month or Patch Tuesday as it has come to be known. No updates were release on Tuesday, October 9, but it turns out that the updates have just been delayed. On October 15, Adobe released a slew of updates to correct vulnerabilities in Adobe Acrobat, Adobe Reader, Adobe Experience Manager, Adobe Experience Manager...

Read More
Many Popular Smartphones Vulnerable to Actively Exploited Zero-Day Android Flaw
Oct15

Many Popular Smartphones Vulnerable to Actively Exploited Zero-Day Android Flaw

A zero-day flaw in the Android operating system used by some of the most popular mobile phones on the market is being exploited in real-world attacks. The zero-day flaw is being exploited by the Israeli surveillance firm NSO Group, which is best known for selling zero-day exploits in operating systems to governments for the purpose of espionage. The flaw is present in the Android Kernel binder driver and is a use-after-free...

Read More