BIMI: A Visual Take on Email Authentication and Security

There is a saying that goes something like, “Do not judge a book by its cover.” Yet, we all know we can not help but do just that – especially when it comes to online security. Logos play a significant...

/ July 26, 2021

Defi protocol THORChain loses $8 million in “seemingly whitehat” attack

DeFi protocol that was hacked last week for the first time and suffered a loss of $8.3 million. Now it has been hacked again, and this time, attackers managed to steal $8 million worth of cryptocurrency Ether. Sophisticated attack on...

/ July 26, 2021

OpenAI’s New Code Generator: GitHub Copilot (and Codex)

@whatsaiLouis Bouchard I explain Artificial Intelligence terms and news to non-experts. You’ve probably heard of the recent Copilot tool by GitHub, which generates code for you. You can see this tool as an auto-complete++ for code. You give it the...

/ July 25, 2021

Dutch Police Arrest Two Hackers Tied to “Fraud Family” Cybercrime Ring

Law enforcement authorities in the Netherlands have arrested two alleged individuals belonging to a Dutch cybercriminal collective who were involved in developing, selling, and renting sophisticated phishing frameworks to other threat actors in what’s known as a “Fraud-as-a-Service” operation. The...

/ July 25, 2021

Beware!! Fake Windows 11 Installer Drop Malware on Your Computer

Earlier this year Microsoft announced Windows 11, and Microsoft hasn’t published this new operating system publicly. But, a few weeks ago Windows 11 was unofficially leaked before Microsoft released it to Windows Insiders. In short, the announcement of the new...

/ July 25, 2021

Is Pisces is the Dumbest Star Sign?

@sloggingSlogging (Slack Blogging) Your Slack? Insightful words by highly intelligent people. Your tech blog? Not so much. Write together. #SloggingBeta This Slogging thread by Amy, Linh, Limarc, Utsav Jaiswal, Arthur, and Natasha occurred in hackernoon’s official #only-at-hackernoon channel, and has...

/ July 24, 2021

Security Information and Event Management (SIEM) – A Detailed Explanation

Logs are fetched to the SIEM in two different ways. Agent-based & Non-Agent based. In the agent-based approach, a log pushing agent is installed in the client machine from which the logs are collected. Then this agent is configured to...

/ July 24, 2021

What We Can Learn From Recent Ransomware Attacks 

Earlier this month, software vendor Kaseya made headlines when a vulnerability in its Virtual System Administrator (VSA) software led to an epidemic of the REvil ransomware. Global ransomware attacks are on the rise, with REvil attacks the most common. According...

/ July 23, 2021

Windows Defender update caught removing zip, exe, source code files

DeCSS software data has enraged Windows 10 by messing with specific stored files. For your information, DeCSS is a free computer system that decrypts content on a commercially produced DVD. Before DeCSS was released, open-source OS such as BSD and...

/ July 23, 2021

Wake up! Identify API Vulnerabilities Proactively, From Production Back to Code

After more than 20 years in the making, now it’s official: APIs are everywhere. In a 2021 survey, 73% of enterprises reported that they already publish more than 50 APIs, and this number is constantly growing. APIs have crucial roles...

/ July 23, 2021

Nasty macOS Malware XCSSET Now Targets Google Chrome, Telegram Software

A malware known for targeting macOS operating system has been updated once again to add more features to its toolset that allows it to amass and exfiltrate sensitive data stored in a variety of apps, including apps such as Google...

/ July 23, 2021

Dissecting TikTok’s Business Model

In 2020, I used TikTok to promote my book. During my research about content, I had trouble seeing TikTok’s business model. There were no posts marked “promoted.” My TikTok experiment failed, meaning I did not sell any books. But ever...

/ July 23, 2021