ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware’s Prevalence

Risk mitigation tips are provided for each of these cybersecurity threats. Continue reading ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware’s Prevalence

Third-Party App Stores Could Be a Red Flag for iOS Security

Even Apple can’t escape change forever. The famously restrictive company will allow third-party app stores for iOS devices, along with allowing users to “sideload” software directly. Spurring the move is the European Union’s (EU) Digital Markets Act (DMA), which looks to ensure open markets by reducing the ability of digital “gatekeepers” to restrict content on […]

The post Third-Party App Stores Could Be a Red Flag for iOS Security appeared first on Security Intelligence.

Continue reading Third-Party App Stores Could Be a Red Flag for iOS Security

Facebook warns 1 million users about apps trying to compromise accounts

Facebook identified 400 apps across the Google Play and Apple App store that posed as harmless lifestyle and business services to dupe users.

The post Facebook warns 1 million users about apps trying to compromise accounts appeared first on CyberScoop.

Continue reading Facebook warns 1 million users about apps trying to compromise accounts

Mobile security firm Zimperium to be acquired by Steven Mnuchin’s private equity group

The former Treasury Secretary’s Liberty Strategic Capital has made a string of investments in cybersecurity businesses.

The post Mobile security firm Zimperium to be acquired by Steven Mnuchin’s private equity group appeared first on CyberScoop.

Continue reading Mobile security firm Zimperium to be acquired by Steven Mnuchin’s private equity group

Digital Transformation: Balancing Speed, Security and Innovation

Today, digital transformation (DX) is happening in every industry. Organizations operating in sectors that typically eschew technology are moving to the cloud, leveraging IoT and using analytics. Digital transformation plays a critical role for any company to stay competitive and resilient. But what does digital transformation look like for most companies, and more importantly, how […]

The post Digital Transformation: Balancing Speed, Security and Innovation appeared first on Security Intelligence.

Continue reading Digital Transformation: Balancing Speed, Security and Innovation

Intelligent Adversary Engagement: Deceiving the Attacker

Traditional security isn’t always enough to keep attackers at bay. When it comes to sneaking into networks, detection will often only come after malicious traffic reaches systems such as next-generation firewalls and intrusion detection and prevention systems. Meanwhile, threat actors have free range. But if you can trick the attacker attempting to trick you, it’s […]

The post Intelligent Adversary Engagement: Deceiving the Attacker appeared first on Security Intelligence.

Continue reading Intelligent Adversary Engagement: Deceiving the Attacker

What is Web Application Security? A Protective Primer for Security Professionals

Evolving threats put applications at risk. Robust web application security can help prevent compromise before it happens. Not sure where to start? Our protective primer has you covered. What Is Web Application Security?  Web application security focuses on the reduction of threats through the identification, analysis and remediation of potential weaknesses or vulnerabilities. While the bulk […]

The post What is Web Application Security? A Protective Primer for Security Professionals appeared first on Security Intelligence.

Continue reading What is Web Application Security? A Protective Primer for Security Professionals

Cryptographers unearth vulnerabilities in Telegram’s encryption protocol

An international team of computer scientists reported on Friday that they found four cryptographic vulnerabilities in the popular encrypted message app Telegram. The weaknesses range “from technically trivial and easy to exploit to more advanced and of theoretical interest,” according to the security analysis. But ultimately they prove that the four key issues “could be done better, more securely and in a more trustworthy manner with a standard approach to cryptography,” said ETH Zurich Professor Kenny Paterson, who was part of the team that uncovered the flaw. The most significant of the vulnerabilities the researchers uncovered is what they called the “crime-pizza” vulnerability. In it, an attacker could alter the order of messages coming from a client to a cloud server that Telegram operates. “For example, if the order of the messages in the sequence ‘I say “yes” to’, ‘pizza’, ‘I say “no” to’, “crime” was altered then it would […]

The post Cryptographers unearth vulnerabilities in Telegram’s encryption protocol appeared first on CyberScoop.

Continue reading Cryptographers unearth vulnerabilities in Telegram’s encryption protocol