Tech Ransomware is 35 years old and now a billion-dollar problem. Here’s how it could evolve

Ryan Browne Key Points Dating back to the 1980s, ransomware is a form of malware used by cybercriminals to lock files on a person’s computer and demand payment to unlock them. The technology — which officially turned 35 in December — has come a long way, with criminals now able to spin up ransomware much faster and deploy it across multiple targets. Experts expect ransomware to evolve even further, with […]

read more

Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans

?Ravie Lakshmanan Russian-speaking users have become the target of a new phishing campaign that leverages an open-source phishing toolkit called Gophish Framework to deliver DarkCrystal RAT (aka DCRat) and a previously undocumented remote access trojan dubbed PowerRAT. “The campaign involves modular infection chains that are either Maldoc or HTML-based infections and require the victim’s intervention to trigger the infection chain,” Cisco Talos researcher Chetan Raghuprasad said in a Tuesday analysis. The targeting of […]

read more

Sophos Fortifies XDR Muscle With $859M Secureworks Purchase

Michael Novinson (MichaelNovinson) Sophos plans to make the largest acquisition in its four-decade history, scooping up Secureworks for $859 million to turbocharge its threat intelligence, detection and response. Sophos Fortifies XDR Muscle See Also: Webinar | Identity Crisis: How to Combat Session Hijacking and Credential Theft with MDR The Oxford, U.K.-based platform security vendor will combine its managed detection and response services with Atlanta-based Secureworks’ XDR, SIEM and identity detection and response […]

read more

Infostealers Waltz Through macOS to Grab Crypto Wallets, Browser Creds

Ironically, Macs’ lower risk profile may make them more susceptible to any given threat than the average Windows or Linux system. Nate Nelson, Contributing Writer A new infostealer is trying to ride the coattails of one of the most prevalent malware tools on the planet, taking advantage of some inherent security shortcomings in macOS environments. In a new blog post, Cado Security discusses “Cthulhu Stealer,” a new cybercrime tool making the rounds […]

read more

By Cybersecurity Safe: Lock Your Digital Door | Leon Geter | TEDxCharleston

Leon Geter’s TEDxCharleston talk, “By Cybersecurity Safe: Lock Your Digital Door,” likely emphasizes the importance of cybersecurity and provides insights on how individuals can protect themselves online. Geter may discuss common cyber threats, such as phishing and malware, and offer practical tips for safeguarding personal information and digital assets. He may also highlight the need for awareness and vigilance in today’s increasingly interconnected world. While I can’t provide specific details […]

read more
Trustpilot
The rating of livingsafeonline.com at Trustprofile Reviews is 9.1/10 based on 13 reviews.
A note to our visitors

This website has updated its privacy policy in compliance with changes to European Union data protection law, for all members globally. We’ve also updated our Privacy Policy to give you more information about your rights and responsibilities with respect to your privacy and personal information. Please read this to review the updates about which cookies we use and what information we collect on our site. By continuing to use this site, you are agreeing to our updated privacy policy.

Verified by MonsterInsights