Australian Government Doubles Down On Cybersecurity in Wake of Major Attacks

John Leyden, Contributing Writer Government proposes more modern and comprehensive cybersecurity regulations for businesses, government, and critical infrastructures providers Down Under. The Australian government is carving out plans to revamp cybersecurity laws and regulations in the wake of a series of damaging high-profile data breaches that rocked the country. Government officials recently released what it called a consultation paper that outlined specific proposals and solicited input from the private sector […]

read more

CISA publishes 447-page draft of cyber incident reporting rule

By-Jonathan Greig: The nation’s top cybersecurity agency has unveiled the initial draft of a new rule detailing how critical infrastructure organizations need to report cyberattacks to the federal government. The Cybersecurity and Infrastructure Security Agency (CISA) posted the 447-page set of regulations under the Cyber Incident Reporting for Critical Infrastructure Act to the Federal Register, allowing the public to comment on it. The law mandating the rules was passed in 2022 and is intended […]

read more

2M+ WordPress Sites Hit By Essential Addons For Elementor Vulnerability

SEJ STAFF-Roger Montti: XSS vulnerabilities in Essential Addons for Elementor could allow attackers to inject malicious scripts into WordPress websites Security researchers published an advisory on the popular Essential Addons For Elementor WordPress plugin which was discovered to contain a Stored Cross-Site Scripting vulnerability affecting over 2 million websites. Flaws in two different widgets that are a part of the plugin are responsible for the vulnerabilities. Two Widgets That Lead […]

read more

Hackers Deploy STRRAT & VCURMS Malware on Windows Via GitHub

By Balaji A new phishing campaign targets users with emails containing a button to “verify payment information.” Clicking the button triggers the download of a malicious JAR file (disguised as an invoice) that leverages a PowerShell command to download two additional JARs. The JARs deploy the STRRAT and VCURMS RATs, granting attackers remote access and keylogging capabilities and credential theft from browsers, applications, Discord, Steam, etc. In contrast, VCURMS can […]

read more

Hackers Transform The Raspberry Pi Into An Online Anonymity Tool

ByBalaji: A new tool, GEOBOX, was advertised on the Dark Web that utilizes Raspberry Pi devices for fraud and anonymization, allowing users to spoof GPS locations, emulate network settings, mimic Wi-Fi access points, and bypass anti-fraud filters. Criminals were using multiple GEOBOX devices as proxies to enhance anonymity during an online banking theft investigation. Attackers are believed to utilize more custom-made or modified devices in the future, creating challenges for […]

read more
Trustpilot
The rating of livingsafeonline.com at Trustprofile Reviews is 9.1/10 based on 13 reviews.
A note to our visitors

This website has updated its privacy policy in compliance with changes to European Union data protection law, for all members globally. We’ve also updated our Privacy Policy to give you more information about your rights and responsibilities with respect to your privacy and personal information. Please read this to review the updates about which cookies we use and what information we collect on our site. By continuing to use this site, you are agreeing to our updated privacy policy.