North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures

?Ravie Lakshmanan North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to distribute malware during the fake hiring process. “In this new campaign, the threat actor group is using three front companies in the cryptocurrency consulting industry—BlockNovas LLC (blocknovas[.] com), Angeloper Agency (angeloper[.]com), and SoftGlide LLC (softglide[.]co)—to spread malware via ‘job interview lures,” Silent Push said in a deep-dive analysis. The activity, the cybersecurity company said, is […]

read more

Don’t just lock your door: MFA alone is not enough in today’s cybersecurity climate

Story by Jon Jarvis The cybersecurity landscape is evolving with serious pace, and organizations are facing increasingly sophisticated threats from attackers who are constantly finding new ways to bypass traditional defenses. For years, Multi-Factor Authentication (MFA) has been heralded as a cornerstone of modern security practices, providing an additional layer of protection beyond passwords. However, as threat actors sharpen their tools and exploit vulnerabilities, it has become clear that MFA alone is no longer sufficient […]

read more

The growing threat of device code phishing and how to defend against It

Story by Mike Britton Just as we think we’re getting one step ahead of cybercriminals, they find a new way to evade our defenses. The latest method causing trouble for security teams is that of device code phishing, a technique that tricks users into granting access to sensitive accounts without attackers needing to steal a password. Microsoft recently issued a warning about a particular device code phishing campaign being conducted by […]

read more

Top 10 Cyber Attacks of 2024

By Guru Baran The year 2024 witnessed a surge in cyber-attacks, with incidents targeting critical infrastructure, healthcare, financial institutions, and even political campaigns. These attacks highlight the growing sophistication of threat actors and the vulnerabilities across industries. Below is a detailed list of the top 10 cyber-attacks of 2024 based on their scale, impact, and geopolitical significance. Key Takeaways from 2024 Cybersecurity Trends Healthcare Under Siege: Ransomware gangs increasingly targeted healthcare […]

read more

Tech Ransomware is 35 years old and now a billion-dollar problem. Here’s how it could evolve

Ryan Browne Key Points Dating back to the 1980s, ransomware is a form of malware used by cybercriminals to lock files on a person’s computer and demand payment to unlock them. The technology — which officially turned 35 in December — has come a long way, with criminals now able to spin up ransomware much faster and deploy it across multiple targets. Experts expect ransomware to evolve even further, with […]

read more
Trustpilot
The rating of livingsafeonline.com at Trustprofile Reviews is 9.1/10 based on 13 reviews.
A note to our visitors

This website has updated its privacy policy in compliance with changes to European Union data protection law, for all members globally. We’ve also updated our Privacy Policy to give you more information about your rights and responsibilities with respect to your privacy and personal information. Please read this to review the updates about which cookies we use and what information we collect on our site. By continuing to use this site, you are agreeing to our updated privacy policy.

Verified by MonsterInsights