Microsoft Exposes Octo Tempest, One of the Most Dangerous Financial Threat Actors to Date

A new report from Microsoft Incident Response and Microsoft Threat Intelligence teams exposed the activities and constant evolution of a financially oriented threat actor named Octo Tempest, who deploys advanced…

Continue ReadingMicrosoft Exposes Octo Tempest, One of the Most Dangerous Financial Threat Actors to Date

Apple Vulnerability Can Expose iOS and macOS Passwords, Safari Browsing History

This Safari vulnerability has not been exploited in the wild. Apple offers a mitigation, but the fix needs to be enabled manually. Image: ink drop/Adobe Stock Security researchers from three…

Continue ReadingApple Vulnerability Can Expose iOS and macOS Passwords, Safari Browsing History

TunnelBear VPN Review 2023: Pricing, Ease of Use & Security

TunnelBear VPN fast factsOur rating: 3.1 stars out of 5Pricing: Starts at $3.33/mo (annual)Key features:Fun, beginner-friendly interface.Annual independent security audits.Unlimited device connections. TunnelBear’s unique, bear-themed approach to its VPN service…

Continue ReadingTunnelBear VPN Review 2023: Pricing, Ease of Use & Security

New Cyberattack From Winter Vivern Exploits a Zero-Day Vulnerability in Roundcube Webmail

After reading the technical details about this zero-day that targeted governmental entities and a think tank in Europe and learning about the Winter Vivern threat actor, get tips on mitigating…

Continue ReadingNew Cyberattack From Winter Vivern Exploits a Zero-Day Vulnerability in Roundcube Webmail

Generative AI Can Write Phishing Emails, But Humans are Better at It, IBM X-Force Finds

Hacker Stephanie "Snow" Carruthers and her team found phishing emails written by security researchers saw a 3% better click rate than phishing emails written by ChatGPT. An IBM X-Force research…

Continue ReadingGenerative AI Can Write Phishing Emails, But Humans are Better at It, IBM X-Force Finds

Five Eyes Coalition Release Guidelines for Business Leaders on Securing Intellectual Property

The Five Eyes coalition's principles focus on reducing the possibility of IP theft, particularly from nation-state-sponsored threat actors. The Five Eyes security alliance, made up of intelligence agencies from Australia,…

Continue ReadingFive Eyes Coalition Release Guidelines for Business Leaders on Securing Intellectual Property