What is cryptojacking? Cryptojacking is a cybercrime in which another party’s computing resources are hijacked to mine cryptocurrency. Cryptojacking, which is also referred to as malicious cryptomining, lets hackers mine cryptocurrency without... Read more »
The US Cybersecurity and Infrastructure Security Agency (CISA) has added six new vulnerabilities to its Known Exploited Vulnerabilities Catalogue, including CVEs in Code Aurora ACDB Audio Driver, Linux Kernel, Microsoft Windows and... Read more »
Controversial ride-sharing service Uber is investigating a major cyber security breach that has forced it to take a number of critical systems offline following an alleged social engineering attack on an employee... Read more »
The European Union’s (EU’s) proposed Cyber Resilience Act will form the nucleus of a worldwide standard for connected devices and software that will impact far beyond the bloc’s borders, including in the... Read more »
Just a day remains for the security community to submit their nominations for the annual Security Serious Unsung Heroes Awards, which close on Friday 16 September at 5pm. This is the seventh... Read more »
Coalition, a US-headquartered pioneer of so-called active insurance is pledging to shake-up the UK market for cyber insurance as it opens a London office. Backed by a multi-year capacity agreement with Allianz... Read more »
The vast majority (84%) of IT and business decision-makers in Europe say they acknowledge the importance of digital trust, but less than 10% of them have designated a staff member with responsibility... Read more »
Three Iranian nationals, named as Mansour Ahmadi, Ahmad Khatibi Aghda, and Amir Hossein Nickaein Ravari, have been indicted in the US over their alleged involvement in a campaign of cyber attacks targeting... Read more »
The FormBook infostealer has ended a seven-month period of dominance for the Emotet trojan-turned-botnet, becoming the most widespread observed malware in August 2022, according to Check Point’s latest Global threat index. FormBook... Read more »
Ransomware operators rely on three key supports to enable them to target organisations en masse, and kicking away just two of these will be a huge win for the security community in... Read more »