Remove tag hacker
article thumbnail

State-sponsored hackers are using COVID-19 lures, Google warns

Security Affairs

Google warns that nation-backed hackers are exploiting the COVID-19 pandemic to organizations involved in the fight against the pandemic. Google’s Threat Analysis Group (TAG) shared its latest findings related to state-backed attacks and revealed that it has identified more than a dozen state-sponsored groups using COVID-19 lures.

Phishing 122
article thumbnail

IoT Cybersecurity: 5 Major Vulnerabilities and How to Tackle Them

Security Affairs

A hacker managed to identify a weak spot in a security camera model. The hacker exploited the vulnerability and used these IoT devices to launch a massive attack on social media platforms. Usually, the default settings are not focused on security. Instead, you should change your credentials regularly. Poor credentials.

IoT 132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Dark Basin, a hack-for-hire group that remained under the radar for 7 years

Security Affairs

Researchers from Citizen Lab uncovered the operations of a hack-for-hire group tracked as Dark Basin that targeted thousands of journalists, elected and senior government officials, advocacy groups, and hedge funds worldwide over 7 years. ” reads the report published by Citizen Lab. ” reads the report published by Citizen Lab.

article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

Martin joins The Hacker Mind to discuss this and his earlier Bluetooth vulnerability research, including the Car Whisperer and the Tesla Radar. And at the time, while you couldn't necessarily start the car, you still needed the fob to present when you hit the start button. So the car would start. I'm Robert Vamosi.

article thumbnail

10 Best CASB Security Vendors of 2022

eSecurity Planet

Any cloud-based infrastructure needs a robust cloud access security broker (CASB) solution to ensure data and application security and integrity. . Cloud access security brokers are increasingly a critical component of the Secure Access Service Edge (SASE) as edge and cloud security become the newest pain points.

Security 141
article thumbnail

Top Container Security Solutions for 2021

eSecurity Planet

But their popularity has made them a target for hackers, making container security an important area to supplement in the already extensive cybersecurity portfolio. The need for container security. Misconfigured permissions can multiply these problems, so container security is too critical to be taken lightly. Compliance.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

What role might the security industry have in identifying or even stopping it? Lodrina Cherne and Martijn Grooten join the The Hacker Mind podcast to discuss their Black Hat USA 2021 presentation. In a moment we'll hear from two hackers who spoke at Black Hat USA 2021. So I hope you'll stick around.