The New York Post made headlines today when it published a series of incendiary and offensive articles online. Depending on your political viewpoint, you may well say "What's new?". But on this occasion the Murdoch-owned tabloid's website was particularly unpleasant - calling for the assassination of political figures like Joe Biden and Alexandria Ocasio-Cortez, and spreading racial slurs. READ MORE...
Enterprise communications firm Twilio has concluded its investigation into the recent data breach and revealed on Thursday that its employees were targeted in smishing and vishing attacks on two separate occasions. On August 7, Twilio revealed that it had detected unauthorized access to information related to customer accounts a few days earlier. A probe revealed that the breach was a result of an SMS phishing (smishing) attack targeting the company's employees. READ MORE...
A novel campaign is using an emerging URL redirection tactic to try to trick business users and others into clicking on an embedded link and giving up credentials. Threat actors are targeting Instagram users in a new phishing campaign that uses URL redirection to take over accounts, or steal sensitive information that can be used in future attacks or be sold on the Dark Web. As a lure, the campaign uses a suggestion that users may be committing copyright infringement. READ MORE...
Apple has released new security updates to backport patches released earlier this week to older iPhones and iPads, addressing an actively exploited zero-day bug. The vulnerability (CVE-2022-42827) is the one Apple patched for iPhone and iPad devices this Monday, October 24. Potential attackers can use it to execute arbitrary code with kernel privileges if successfully exploited in attacks. READ MORE...
New technologies designed into processors allow enterprises to leverage cloud advantages while meeting privacy regulations. Data security in the public cloud has been a concern since the computing medium emerged in the mid-2000s, but cloud providers are allaying fears of theft with a new concept: confidential computing. Confidential computing involves creating an isolated vault on hardware - also called a trusted execution environment - in which encrypted code is protected and stored. READ MORE...