This Windows malware uses PowerShell to inject malicious extension into Chrome And that's a bit odd, says Red Canary Research27 May 2022 | 9
How to reprogram Apple AirTags, play custom sounds Voltage glitch here, glitch there, now you can fiddle with location disc's firmware Research27 May 2022 | 2
Ransomware encrypts files, demands three good deeds to restore data Shut up and take ... poor kids to KFC? Research26 May 2022 | 9
Cheers ransomware hits VMware ESXi systems Now we can say extortionware has jumped the shark Research26 May 2022 | 3
Verizon: Ransomware sees biggest jump in five years We're only here for DBIRs Research26 May 2022 | 6
Ex-spymaster and fellow Brexiteers' emails leaked by suspected Russian op A 'Very English Coop (sic) d'Etat' Research26 May 2022 | 143
About half of popular websites tested found vulnerable to account pre-hijacking In detail: Ocean's Eleven-grade ruse in which victims' profiles are rigged from the start Research25 May 2022 | 11
Predator spyware sold with Chrome, Android zero-day exploits to monitor targets Or so says Google after tracking 30+ vendors peddling surveillance malware Research24 May 2022 | 6
It's 2022 and there are still malware-laden PDFs in emails exploiting bugs from 2017 Crafty file names, encrypted malicious code, Office flaws – ah, it's like the Before Times Research24 May 2022 | 23
Microsoft Bing censors politically sensitive Chinese terms Updated Research claims it fails to autofill certain names in Han characters, Microsoft says it's technical error Research20 May 2022 | 22
Hot glare of the spotlight doesn’t slow BlackByte ransomware gang Crew's raids continue worldwide, Talos team warns Research19 May 2022 | 4
Your snoozing iOS 15 iPhone may actually be sleeping with one antenna open No, you're not really gonna be hacked. But you may be surprised Research19 May 2022 | 40
Meet Wizard Spider, the multimillion-dollar gang behind Conti, Ryuk malware Analysis Russia-linked crime-as-a-service crew is rich, professional – and investing in R&D Research18 May 2022 | 3
Pentester pops open Tesla Model 3 using low-cost Bluetooth module Anything that uses proximity-based BLE is vulnerable, claim researchers Research17 May 2022 | 51
Shopping for malware: $260 gets you a password stealer. $90 for a crypto-miner... We take a look at low, low subscription prices – not that we want to give anyone any ideas Research14 May 2022 | 6
Most organizations hit by ransomware would pay up if hit again Nine out of ten organizations would do it all over again, keeping attackers in business Research13 May 2022 | 34
Iran-linked Cobalt Mirage extracts money, info from US orgs – report Khamenei, can you just not? Not right now, fam Research13 May 2022 | 3
Anatomy of a campaign to inject JavaScript into compromised WordPress sites Reverse-engineered code redirects visitors to dodgy corners of the internet Research13 May 2022 | 8
It costs just $7 to rent DCRat to backdoor your network Budget-friendly tool breaks the you-get-what-you-pay-for rule Research09 May 2022 | 10
Security is a pain for American Dental Association: Ransomware infection feared In brief Plus: Another university hit with malware, and more Research02 May 2022 | 5
Amazon investors nuke proposed ethics overhaul and say yes to $212m CEO pay Workplace safety, labor organizing, sustainability and, um, wage 'fairness' all struck down in vote
When management went nuclear on an innocent software engineer On Call It says 'Do Not Touch,' not 'Rip Out My Guts'
Broadcom to 'focus on rapid transition to subscriptions' for VMware Offers comforting vision for core customers, products, channel – though warns efficiencies are coming
Minimal, systemd-free Alpine Linux releases version 3.16 A widespread distro that many of its users don't even know they have
GitHub saved plaintext passwords of npm users in log files, post mortem reveals Unrelated to the OAuth token attack, but still troubling as org reveals details of around 100,000 users were grabbed by the baddies
Ransomware encrypts files, demands three good deeds to restore data Shut up and take ... poor kids to KFC?
Ex-spymaster and fellow Brexiteers' emails leaked by suspected Russian op A 'Very English Coop (sic) d'Etat'
Elon Musk needs more cash for Twitter buy after Tesla margin loan lapses Entrepreneur now looking at $33.5b bill if he wants to complete $44b purchase
Windows Subsystem for Linux 2 splashes down on Win Server 2022 I don't think it's going to happen, I don't think it's going to happen... It happened
Clonezilla 3: Copy and clone disk images to your heart's content Even non-sysadmins may find this Linux live ISO handy
Facebook's Meta, tracking code, and the student financial aid website Also: Oculus virtual reality apps fail to detail info collection Research30 Apr 2022 | 15
Data-wiper malware strains surge as Ukraine battles ongoing invasion Besides files being erased, another thing being deleted: Any sense this is a coincidence Research29 Apr 2022 | 11
Bumblebee malware loader emerges as Conti's BazarLoader fades At least three threat groups are using the loader in malicious email campaigns Research29 Apr 2022 | 3
Study: How Amazon uses Echo smart speaker conversations to target ads Updated Web giant milks advertisers with data harvested from digital assistant Research27 Apr 2022 | 167
Who is exploiting VMware right now? Probably Iran's Rocket Kitten, to name one We hope you've patched that 9.8/10 severity bug Research26 Apr 2022 | 5
Now Mandiant says 2021 was a record year for exploited zero-day security bugs Now that's a race condition Research23 Apr 2022 | 4
Criminals adopting new methods to bypass improved defenses, says Zscaler PhaaS, SMiShing, and remote work drive increase in phishing attacks Research20 Apr 2022 | 5
Time for people to patch backup plugin for WordPress In brief Plus advice for Cisco admins from the NSA and blurring's not the best Research21 Feb 2022 | 9
CyberUp presents four principles to keep security researchers out of jail for good-faith probing Computer Misuse Act campaign gets down to brass tacks Research03 Nov 2021 | 10