Fake Trezor app steals more than $1 million worth of crypto coins

Several users of Trezor, a small hardware device that acts as a cryptocurrency wallet, have lost fortunes after being duped by a phishing app.

Read more

Teen behind 2020 Twitter hack pleads guilty

The teen behind the Twitter hack of 2020 pleaded guilty to several charges as part of a deal in which he will serve three years in prison.

Read more

Egregor ransomware hit by arrests

In a collaboration between French and Ukranian law enforcement, threat actors related to the Egregor ransomware team have been arrested.

Read more

Keeping ransomware cash away from your business

Ransomware gangs are in the news for donating stolen funds to charitable organisations. Is this a good thing, or will it cause more trouble for the charity than it’s worth?

Read more

VideoBytes: Twitter gets hacked!

Today, we’re talking about the Twitter hack, in which 130 high-profile accounts, like those belonging to Barack Obama and Elon Musk, were accessed.

Read more

A week in security (July 20 – 26)

A roundup of cybersecurity news from July 20 – 26, including Deepfakes, Bluetooth technology, and APT groups.

Read more

Coordinated Twitter attack rakes in 100 grand

In a social engineering attack on Twitter, threat actors managed to scam $100,000 dollars in Bitcoin by taking over high-profile accounts.

Read more

Coronavirus Bitcoin scam promises “millions” working from home

We look at a set of Coronavirus Bitcoin scam emails promising vast sums of cryptocash that can be made working from home—but drains users accounts instead.

Read more

Threat spotlight: RobbinHood ransomware takes the driver’s seat

RobbinHood a is a ransomware family that specifically targets organizations using a vulnerable kernel driver to prepare systems for encryption. Learn how to protect against it.

Read more

Sextortion scammers getting creative

We’ve covered sextortion before, focusing in on how the core of the threat is an exercise in trust. The threat actor behind the campaign will use whatever information available on the target that causes them to trust that the threat actor does indeed have incriminating information on them. (They don’t.) But as public awareness of…

Read more

Select your language