North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures

î „Ravie Lakshmanan North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to distribute malware during the fake hiring process. “In this new campaign, the threat actor group is using three front companies in the cryptocurrency consulting industry—BlockNovas LLC (blocknovas[.] com), Angeloper Agency (angeloper[.]com), and SoftGlide LLC (softglide[.]co)—to spread malware via ‘job interview lures,” Silent Push said in a deep-dive analysis. The activity, the cybersecurity company said, is […]

read more

Don’t just lock your door: MFA alone is not enough in today’s cybersecurity climate

Story by Jon Jarvis The cybersecurity landscape is evolving with serious pace, and organizations are facing increasingly sophisticated threats from attackers who are constantly finding new ways to bypass traditional defenses. For years, Multi-Factor Authentication (MFA) has been heralded as a cornerstone of modern security practices, providing an additional layer of protection beyond passwords. However, as threat actors sharpen their tools and exploit vulnerabilities, it has become clear that MFA alone is no longer sufficient […]

read more

Thailand introduces new cybercrime law to tackle data misuse

 Puntid Tantivangphaisal A new cybercrime law aims to tackle cybercrime at its roots by preventing the misuse of personal data, as stated by the Personal Data Protection Committee (PDPC). PDPC Secretary General, Police Colonel Surapong Plengkham, announced yesterday, April 21, that the Royal Decree on Measures for the Prevention and Suppression of Cybercrime 2025 has been officially published in the Royal Gazette. A primary aspect of the law, effective from April 13, is the protection of […]

read more

The growing threat of device code phishing and how to defend against It

Story by Mike Britton Just as we think we’re getting one step ahead of cybercriminals, they find a new way to evade our defenses. The latest method causing trouble for security teams is that of device code phishing, a technique that tricks users into granting access to sensitive accounts without attackers needing to steal a password. Microsoft recently issued a warning about a particular device code phishing campaign being conducted by […]

read more

North Korean hackers are using LinkedIn to entice developers to coding challenges

Story by Efosa Udinmwen A hacker group from North Korea known as Slow Pisces has launched a sophisticated campaign targeting developers in the cryptocurrency sector through LinkedIn. The group, also known as TraderTraitor or Jade Sleet, poses as recruiters to lure victims with seemingly genuine job offers and coding challenges, only to infect their systems with malicious Python and JavaScript code. Thanks to this campaign, the group has been able to […]

read more
Trustpilot
The rating of livingsafeonline.com at Trustprofile Reviews is 9.1/10 based on 13 reviews.
A note to our visitors

This website has updated its privacy policy in compliance with changes to European Union data protection law, for all members globally. We’ve also updated our Privacy Policy to give you more information about your rights and responsibilities with respect to your privacy and personal information. Please read this to review the updates about which cookies we use and what information we collect on our site. By continuing to use this site, you are agreeing to our updated privacy policy.