Tumblr patches bug that could have exposed user data

The microblogging platform is assuring its users that has found no evidence that any data was actually stolen. Tumblr has fixed a vulnerability that it says could have exposed private user data, according to an announcement by the microblogging and social networking site. The information that could have been viewed by unauthorized parties includes email addresses, … More Tumblr patches bug that could have exposed user data

GreyEnergy: Updated arsenal of one of the most dangerous threat actors

ESET research reveals a successor to the infamous BlackEnergy APT group targeting critical infrastructure, quite possibly in preparation for damaging attacks. Recent ESET research has uncovered details of the successor of the BlackEnergy APT group, whose main toolset was last seen in December 2015 during the first-ever blackout caused by a cyberattack. Around the time … More GreyEnergy: Updated arsenal of one of the most dangerous threat actors

Tips for minding the digital skills gap

The times they are a-changin‘, so how do you build and sharpen the skills that you need to avoid being left behind by the digital revolution? With digital transformation moving apace, hardly any aspect of our lives is spared the dramatic effects of lightning-fast technological advances. The workplace is no exception, as the ubiquity of … More Tips for minding the digital skills gap

New TeleBots backdoor: First evidence linking Industroyer to NotPetya

ESET’s analysis of a recent backdoor used by TeleBots – the group behind the massive NotPetya ransomware outbreak – uncovers strong code similarities to the Industroyer main backdoor, revealing a rumored connection that was not previously proven. Among the most significant malware-induced cybersecurity incidents in recent years were the attacks against the Ukrainian power grid – which … More New TeleBots backdoor: First evidence linking Industroyer to NotPetya

Send in the clones: Facebook cloning revisited

As another confusing message spreads, we look at Facebook privacy, cloning, and hacking. Here’s an edited version of a post about Facebook account cloning I posted last year (2017) which has been getting a lot of hits recently. Heads-up!! Almost every account is being cloned. Your picture and your name are used to create a … More Send in the clones: Facebook cloning revisited

Most routers full of firmware flaws that leave users at risk

If you own a Wi-Fi router, it may well be riddled with security holes that expose you to a host of threats. Five out of every six (83%) Wi-Fi routers in US homes and offices leave their users at risk of cyberattacks, because their firmware is inadequately updated for security vulnerabilities, research by The American Consumer … More Most routers full of firmware flaws that leave users at risk

Virus Bulletin 2018: Supply chain hacking grows up

Striking the balance between supply, demand and safety is a major concern. With the pressure to ship as early as possible, especially when it comes to hardware, what assurances do we have that the hardware is really clean, and that future updates won’t be hacked? Here at Virus Bulletin 2018, the conversation of how to … More Virus Bulletin 2018: Supply chain hacking grows up