€5.5 million fine imposed on WhatsApp for data protection violations

On Thursday, Ireland’s Data Protection Commission (DPC) fined Meta’s WhatsApp a new €5.5 million for violating data protection laws when processing users’ personal data.  As a result of the ruling, the platform’s Terms of Service have been updated, requiring users to agree to the new terms in preparation for the General Data Protection Regulation (GDPR) […]

Android devices are being exploited by hackers with RATs

The threat actor behind the BlackRock and ERMAC Android banking trojans has unleashed yet another malware for rent called Hook that introduces new capabilities to access files stored on the devices and create a remote interactive session.  ThreatFabric, in a report, characterized Hook as a novel ERMAC fork that’s advertised for sale for $7,000 per […]

Warning: Tainted VPNs are Distributing EyeSpy Monitoring Software

A compromised VPN installer is used to distribute surveillance software called EyeSpy as part of a malware campaign launched in May 2022.  It uses “SecondEye’s component (a legitimate surveillance application) to spy on users of Iran-based VPN service, 20Speed ​​VPN, via trojanized installers,” said Bitdefender in its analysis.  The US Romanian cybersecurity firm added that […]

The Age of Sharing Cyber Threat Intelligence

We have spent 40 years protecting ourselves as individuals. We tried to trick and outsmart the cybercriminals, but when all our efforts failed, we thought of working with our peers to outnumber them.  Cybercriminals don’t remake themselves every time. They have limited resources and limited budgets. So they use playbooks to attack a lot of […]

What Cybercrime & Security Will Look Like in 2023

Threat actors continue to adapt to the latest technologies, practices, and even privacy laws. It’s up to your organization to stay ahead by implementing strong cybersecurity measures and programs. Here’s how cybercrime will evolve in 2023, and what you can do to keep your business safe and secure in the year ahead. Surge in Attacks […]

Cybersecurity is not a losing game – start now

Reality has a way of asserting itself, no matter what personal or business choices we make, good or bad. For example, very recently, the services of the city of Antwerp in Belgium were the victim of a very disruptive cyber attack. As usual, people cried out ‘bad play’ and suggested that appropriate cybersecurity measures should […]

Tech InDepth: Understanding a future without passkeys and passwords

Tech giants like Apple and Google don’t always have the same mindset when it comes to innovation. For example, take the RCS vs. iMessage debate. But if there’s one thing they’ve agreed on over the years, it’s to do away with passwords and introduce the next step in online security: passkeys. As this report shows, […]

New Digital Personal Data Protection Bill in India ,2022

The new Digital Personal Data Protection Bill, 2022, which was unveiled on 18 November, puts more focus on personal data than previous cumbersome drafts. The revised version of the law provides for high penalties for violations, but these penalties are limited regardless of the turnover of the companies involved. It also eased rules on cross-border […]

Lets talk about Supply Chain Attacks and Cloud Native

The past couple of years have seen an upward push in software supply chain attack, with the maximum salient example being the SolarWinds attack. As production environments have gained a couple of layers of safety, and lots of the attention of safety groups, malicious actors have set their points of interest on “poisoning the properly”, […]