-
Jun 26, 2022
Cybersecurity Google says attackers worked with ISPs to deploy Hermit spyware on Android and iOS A sophisticated spyware campaign is getting the help of internet service providers (ISPs) to trick users into downloading malicious apps, according to research published by… read more »
-
Jun 19, 2022
Cybersecurity China-linked APT Flew Under Radar for Decade Evidence suggests that a just-discovered APT has been active since 2013. DeadBolt ransomware takes another shot at QNAP storage QNAP is warning users about another wave of DeadBolt ransomware attacks against its… read more »
-
Jun 18, 2022
Four Quartets for synth ensemble, four rarefied, meditative and relaxing pieces.
Recommended good headphones.
Album cover
“Four Quartets”, my new album, is out on Spotify and all major music streaming platforms.
… read more »
-
Jun 12, 2022
Cybersecurity Multi-factor Authentication In-The-Wild bypass methods Two-factor authentication (2FA) or multi-factor authentication ( MFA ) is a method to authenticate through a service that requires at least two proofs of recognition. PACMAN M1 chip attack defeats ‘the last line of… read more »
-
Jun 11, 2022
Some days ago, a follower asked me for more information about an article announcing the possibility of hacking iPhones even when switched off. Actually, the situation is not that serious, but let’s take a step back. “slide to power off”… read more »
-
Jun 5, 2022
Cybersecurity Microsoft disrupts Bohrium hackers’ spear-phishing operation The Microsoft Digital Crimes Unit (DCU) has disrupted a spear-phishing operation linked to an Iranian threat actor tracked as Bohrium that targeted customers in the U.S., Middle East, and India. SMSFactory Android Trojan… read more »
-
May 29, 2022
Cybersecurity Operation Delilah: Unit 42 Helps INTERPOL Identify Nigerian Business Email Compromise Actor Today, INTERPOL and The Nigeria Police Force announced the arrest of a prominent business email compromise (BEC) actor who has been active since 2015. How This Shocking… read more »
-
May 22, 2022
Cybersecurity ITG23 Crypters Highlight Cooperation Between Cybercriminal Groups IBM Security X-Force researchers have continually analyzed the use of several crypters developed by the cybercriminal group ITG23, also known as Wizard Spider, DEV-0193, or simply the “Trickbot Group”. InfoSec Handlers Diary… read more »