Find a PlayStation 4 vulnerability and earn over $50,000

Do you think you have found a vulnerability in the Sony PlayStation 4 or the PlayStation Network? If so, you could be heading towards a sizeable sum of money. That’s because Sony announced details of a new bug bounty program that it is running in… Continue reading Find a PlayStation 4 vulnerability and earn over $50,000

Lucifer Malware Abused Windows Exploits for Cryptomining, DDoS Attacks

New malware called “Lucifer” came with numerous exploits for conducting cryptomining functionality and performing distributed denial-of-service (DDoS) attacks on infected Windows machines. Palo Alto Networks’ Unit 42 research team ide… Continue reading Lucifer Malware Abused Windows Exploits for Cryptomining, DDoS Attacks

New CryCryptor Ransomware Masqueraded as COVID-19 Tracing App

Security researchers came across a new ransomware family called “CryCryptor” that masqueraded as a Canadian COVID-19 tracing app. CryCryptor emerged just days after the Canadian government announced it would support the development of a nat… Continue reading New CryCryptor Ransomware Masqueraded as COVID-19 Tracing App

State of Insider Data Breaches in 2020

Organizations protect critical assets and sensitive information from the outside world by continually updating their security controls and policies. However, the origin of a breach is not always outside of the organization, and recently, insider breach… Continue reading State of Insider Data Breaches in 2020

Ryuk Ransomware Deployed Two Weeks After Initial Trickbot Infection

Several attack campaigns waited two weeks after achieving a successful Trickbot infection before they deployed Ryuk ransomware as their final payload. SentinelOne came across the attacks as the result of monitoring an attack server employed by Trickbot… Continue reading Ryuk Ransomware Deployed Two Weeks After Initial Trickbot Infection

Beyond Passing the Test: Lessons from My Infosec Certification Journey

Not everything that tastes good is healthy, and not everything healthy tastes good. I think of exams as the latter. They are one way to test knowledge, and that attitude is a big part of how I survived getting certified. After taking all kinds of exams… Continue reading Beyond Passing the Test: Lessons from My Infosec Certification Journey

NitroHack Modifies Windows Discord Client into Infostealing Trojan

Security researchers discovered a new malware threat called “NitroHack” that modifies the Discord client for Windows into an infostealing trojan. MalwareHunterTeam observed malicious actors abusing DM’s from infected Discord users as … Continue reading NitroHack Modifies Windows Discord Client into Infostealing Trojan

Copied master key forces South African bank to replace 12 million cards

Fraudsters stole more than $3.2 million from the banking division of South Africa’s post office, after – in a catastrophic breach of security – employees printed out the bank’s master key. According to South African media report… Continue reading Copied master key forces South African bank to replace 12 million cards

Amazon Web Services Mitigated a 2.3 Tbps DDoS Attack

Amazon Web Services (AWS) said that it mitigated a distributed denial-of-service (DDoS) attack with a volume of 2.3 Tbps. In its “Threat Landscape Report – Q1 2020,” AWS Shield revealed that its team members had spent several days res… Continue reading Amazon Web Services Mitigated a 2.3 Tbps DDoS Attack

The COVID-19 Pandemic Dominates the Cybersecurity World

Cybersecurity is not a static world. You can say that it is a social system, it affects and is affected by its surrounding environment. For example, back in 2018, it was the GDPR that shook the foundations of security and privacy by making the protecti… Continue reading The COVID-19 Pandemic Dominates the Cybersecurity World