Sophos Alerts Businesses to Rising ‘Quishing’ Cyber Threat

Sophos logo

Quishing: A New Cyber Security Challenge

Cyber security firm Sophos has identified a novel attack vector dubbed ‘quishing’ or QR code phishing. This method involves the use of fraudulent QR codes hidden within PDF attachments sent via email. These PDFs … Read the rest “Sophos Alerts Businesses to Rising ‘Quishing’ Cyber Threat”

SmokeLoader Malware Campaign Targets Taiwanese Manufacturing and IT Sectors

Taiwan’s manufacturing, healthcare, and IT sectors are currently under siege by a sophisticated cyberattack involving the SmokeLoader malware, a notorious downloader known for its evasion tactics and versatility in executing various types of attacks.

What is SmokeLoader?

SmokeLoader, first identified … Read the rest “SmokeLoader Malware Campaign Targets Taiwanese Manufacturing and IT Sectors”

North Korean Hackers Use AI in LinkedIn Scams, Netting $10M

Helmeted hacker using laptop

North Korean cyber operatives, identified as Sapphire Sleet, have reportedly siphoned off over $10 million in cryptocurrency through sophisticated social engineering schemes over six months, according to Microsoft. These hackers, linked to notorious groups like APT38 and BlueNoroff, have been … Read the rest “North Korean Hackers Use AI in LinkedIn Scams, Netting $10M”

Internet Archive Data Breach: A Wake-Up Call for Digital Security

archive.org hacked message

The Internet Archive, a cornerstone of digital preservation and the home of the popular “Wayback Machine,” has recently fallen victim to a significant data breach. This breach has exposed sensitive information from over 31 million users, raising serious concerns … Read the rest “Internet Archive Data Breach: A Wake-Up Call for Digital Security”

Hackers Breach Payment Service Provider Slim CD; Credit Card Data of 1.7 Million People Exposed

A major data breach at Slim CD, a prominent payment service provider, has resulted in the exposure of sensitive credit card information belonging to approximately 1.7 million customers. The company, which processes millions of transactions for businesses worldwide, confirmed the … Read the rest “Hackers Breach Payment Service Provider Slim CD; Credit Card Data of 1.7 Million People Exposed”

What Requirements Apply When Transmitting Secret Information?

In today’s digital world, the secure transmission of classified or sensitive information is crucial for protecting data from unauthorized access. Whether it’s government-level intelligence or confidential corporate strategies, understanding the cloud security measures, IT security and requirements for securely transmitting … Read the rest “What Requirements Apply When Transmitting Secret Information?”

U.S. Federal Agencies Targeted in Widespread Cyberattack Exploiting Software Vulnerability

hacker background

A global cyberattack has struck several U.S. federal government agencies, allegedly orchestrated by Russian cybercriminals. The attack, which exploited a security vulnerability in widely-used software, has raised significant concerns among U.S. cybersecurity officials.

According to the U.S. Cybersecurity and Infrastructure … Read the rest “U.S. Federal Agencies Targeted in Widespread Cyberattack Exploiting Software Vulnerability”

Fortressing Your Code: Secure Development Practices

code on screen

In today’s digital landscape, software development has shifted beyond the confines of delivering innovative features and compelling user experiences. In 2024, security has become an inextricable component of coding, a factor that developers must continuously address throughout the entire lifecycle … Read the rest “Fortressing Your Code: Secure Development Practices”