Search

Showing 165 results for: "netflix".

Browser-based phishing attacks surge due to AI
Artificial intelligence has driven the 140% year-over-year increase in browser-based phishing intrusions in 2024, with the technology also behind the 130% year-over-year growth in zero-hour phishing attack prevalence, SiliconAngle reports. While most of the browser-based phis...
ShmooCon ends 20-year run with tears, malware and electronic fun
The final ShmooCon was held this past weekend (Jan. 10-12) in Washington, D.C., capping 20 years of the East Coast's leading hacker conference. The late-night sessions at the hotel bar had a bittersweet element, with lots of hugs, reminiscences, and piano sing-alongs involving hearty choruses of...
Four ways to mitigate the abuse of generic top-level domains
COMMENTARY: Domain mirroring, or a domain impersonation attack, remains one of the oldest tricks in the phishing playbook. It’s when threat actors mimic website domain names of established brands to deceive users into believing they are interacting with a legitimate site or service. Imitating th...
Upcoming Olympics subjected to Russian disinformation campaign
Russian state-sponsored threat groups Storm-1679 and Storm-1099 have diverted their influence operations to target the upcoming Summer Olympic Games in Paris, according to The Register. Months after paying celebrities to create Cameo videos aimed at undermining Ukraine President Volodymyr Zelens...
Rockwell to customers: Remove public-facing ICS devices from internet
In response to heightened geopolitical tensions and potential attacks on critical infrastructure sectors, Rockwell Automation released guidance encouraging users to remove connectivity to all industrial control systems (ICS) devices with public-facing internet access.   In an advisory to custome...
Fake popular Android app versions found stealing credentials
A recent report showed that users' credentials are being stolen by malicious Android apps using phishing URLs mimicking well-known services that include Facebook, GitHub, Instagram, LinkedIn, Microsoft, Netflix, PayPal, Proton Mail, Snapchat, Tumblr, X, WordPress, and Yahoo, though it is unclear wh...
Six common developer security fails that lead to cloud risks
Baking security controls early on and throughout the development process – a.k.a., shifting security left – has led to systemic improvements in enterprise security. Even so, cloud security has become a mind-boggling, complex endeavor that’s created new risks and let attackers put a new spin on o...
Biggest data leak in history exposes 26B records
Twenty-six billion records amounting to 12TB of data, a significant amount of which was compiled from prior data breaches, have been exposed as part of a colossal leak, which has been regarded as the Mother of all Breaches, according to Cybernews. Most of the exposed data, which was found on an ope...

You can skip this ad in 5 seconds