Kaseya supply‑chain attack: What we know so far

Kaseya supply‑chain attack: What we know so far

As news breaks about the supply-chain ransomware attack against Kaseya’s IT management software, here’s what we know so far Just when we were getting over the SolarWinds supply-chain attack, we see Kaseya IT management software, commonly used in Managed Service Provider (MSP) environments, hit by another in a series of supply-chain hacks. As with the…
Data for 700 million LinkedIn users up for grabs on hacker forum

Data for 700 million LinkedIn users up for grabs on hacker forum

Information scraped from LinkedIn user profiles includes full names, gender, email addresses and phone numbers For the second time this year, data scraped from the accounts of hundreds of millions of LinkedIn users has been posted for sale on a hacking forum. This haul seems to be even bigger than the one that involved data…
Common Facebook scams and how to avoid them

Common Facebook scams and how to avoid them

Are you on Facebook? So are scammers. Here are some of the most common con jobs on Facebook you should watch out for and how you can tell if you’re being scammed. While various social media platforms have popped up over the years, Facebook remains one of the most popular of them all. Case in…
Brave launches its own, privacy‑focused search engine

Brave launches its own, privacy‑focused search engine

Brave’s search engine takes on Google, promising to let users surf the web without leaving a trace Brave, the company known for its eponymous web browser, has announced the launch of its own search engine dubbed Brave Search. The product, which is currently in beta and is built on an entirely independent search index, promises…
Gaming industry under siege from cyberattacks during pandemic

Gaming industry under siege from cyberattacks during pandemic

Cyberattacks targeting the gaming industry skyrocket, with web attacks more than tripling year-on-year in 2020 During the COVID-19 pandemic, the gaming industry has seen greater growth in cyberattacks than any other industry, according to content delivery network (CDN) provider Akamai. Web application attacks against gaming companies rose by 340 percent between 2019 and 2020 and…
In Memoriam: John McAfee

In Memoriam: John McAfee

What was it like to work for, and be friends with, the larger-than-life technology entrepreneur back when he helped shape the computer security industry? Editor’s note: The views expressed in this article are solely those of the author and do not necessarily reflect the views of WeLiveSecurity and ESET. This is probably not the first…
Microsoft takes down large‑scale BEC operation

Microsoft takes down large‑scale BEC operation

The fraudsters ran their campaigns from the cloud and used phishing attacks and email forwarding rules to steal financial information Microsoft has shut down a sprawling Business Email Compromise (BEC) operation that had its infrastructure hosted in several web services. Using these cloud-based assets, the threat actors infiltrated hundreds of mailboxes across multiple organizations and…
Most health apps engage in unhealthy data‑harvesting habits

Most health apps engage in unhealthy data‑harvesting habits

Most medical and fitness apps in Google Play have tracking capabilities enabled and their data collection practices aren’t transparent As many as 88 percent of almost 21,000 mobile health (mHealth) applications that are accessible on the Google Play Store from Australia include code that can access and even share users’ personal data with third parties,…
OSINT 101: What is open source intelligence and how is it used?

OSINT 101: What is open source intelligence and how is it used?

OSINT can be used by anyone, both for good and bad ends – here’s how defenders can use it to keep ahead of attackers The cybersecurity industry often gets obsessed with technology: the latest exploits, hacking tools and threat hunting software. In reality, a lot comes down to people. It’s people who develop malware, people…
State‑sponsored or financially motivated: Is there any difference anymore?

State‑sponsored or financially motivated: Is there any difference anymore?

What does the increasingly fuzzy line between traditional cybercrime and attacks attributed to state-backed groups mean for the future of the threat landscape? Governments have always conducted offensive cyber-operations. But over the past few years, campaigns have seemed to grow in audacity and volume. The headlines scream about “state-sponsored” or “nation state” raids targeting everything…