Monthly Archives: June 2024

Minecraft accounts deleted by Microsoft for not migrating from Mojang, sparks rage among users

Minecraft, which is also getting a Netflix series, players are up in arms after Microsoft reportedly deleted a number of accounts that weren’t migrated to the company’s new system by the end of 2023. Users who log in with their old Mojang accounts are finding them permanently inaccessible, with no option for recovery or contacting […]

Podcastle Review: Can It Simplify Podcast Production?

In this Podcastle review, I’ll show you all the core features that (maybe) make it one of the most simple yet effective platforms for podcast production. If you’ve never made a podcast, you can also find a useful tutorial on how to do it with Podcastle. I’ve also included a breakdown of pricing (you can […]

New Attack Technique ‘Sleepy Pickle’ Targets Machine Learning Models

The security risks posed by the Pickle format have once again come to the fore with the discovery of a new “hybrid machine learning (ML) model exploitation technique” dubbed Sleepy Pickle. The attack method, per Trail of Bits, weaponizes the ubiquitous format used to package and distribute machine learning (ML) models to corrupt the model […]

Arid Viper Launches Mobile Espionage Campaign with AridSpy Malware

The threat actor known as Arid Viper has been attributed to a mobile espionage campaign that leverages trojanized Android apps to deliver a spyware strain dubbed AridSpy. “The malware is distributed through dedicated websites impersonating various messaging apps, a job opportunity app, and a Palestinian Civil Registry app,” ESET researcher Lukáš Štefanko said in a […]

From the Trenches: A CISO’s Guide to Threat Intelligence

Originally published by CXO REvolutionaries.Written by Ben Corll, CISO in Residence, Zscaler.Let’s face it, our jobs as CISOs are a constant dance with the shadows. We fight invisible enemies, anticipate the next attack, and strive to stay one step ahead of ever-evolving threats. That’s where threat intelligence comes in – it’s the intel that fuels […]

Why SaaS Security is Suddenly Hot: Racing to Defend and Comply

Recent supply chain cyber-attacks are prompting cyber security regulations in the financial sector to tighten compliance requirements, and other industries are expected to follow. Many companies still don’t have efficient methods to manage related time-sensitive SaaS security and compliance tasks. Free SaaS risk assessment tools are an easy and practical way to bring visibility and […]

Pakistan-linked Malware Campaign Evolves to Target Windows, Android, and macOS

Threat actors with ties to Pakistan have been linked to a long-running malware campaign dubbed Operation Celestial Force since at least 2018. The activity, still ongoing, entails the use of an Android malware called GravityRAT and a Windows-based malware loader codenamed HeavyLift, according to Cisco Talos, which are administered using another standalone tool referred to […]