While security training can help create a culture of cybersecurity awareness, it can’t be relied upon to consistently change behavior. Learn more from Specops Software about the limitations of training and five ways you can increase password security. […]
Category Archives: Bleeping Computer
A massive ad fraud campaign named “SubdoMailing” is using over 8,000 legitimate internet domains and 13,000 subdomains to send up to five million emails per day to generate revenue through scams and malvertising. […]
The LockBit gang is relaunching its ransomware operation on a new infrastructure less than a week after law enforcement hacked their servers, and is threatening to focus more of their attacks on the government sector. […]
PayPal has filed a patent application for a novel method that can identify when “super-cookie” is stolen, which could improve the cookie-based authentication mechanism and limit account takeover attacks. […]
The Royal Canadian Mounted Police (RCMP), Canada’s national police force has disclosed that it recently faced a cyber attack targeting its networks. The federal body has started its criminal investigation into the matter as it works to determine the scope of the security breach. […]
Apple is adding to the iMessage instant messaging service a new post-quantum cryptographic protocol named PQ3, designed to defend encryption from quantum attacks. […]
The U.S. Federal Trade Commission (FTC) sued tax preparation giant H&R Block over the company’s deceptive “free” online filing advertising and for pressuring people into overpaying for its services. […]
Sony subsidiary Insomniac Games is sending data breach notification letters to employees whose personal information was stolen and leaked online following a Rhysida ransomware attack in November. […]
Google is retiring the standalone Pay app in the United States. Users have until June 4 to transfer the balance to bank accounts. […]
The LockBit ransomware gang received more than $125 million in ransom payments over the past 18 months, according to the analysis of hundreds of cryptocurrency wallets associated with the operation. […]