VPN and privacy news

News articles - Page of
Close searchfield
LazyScripter: A Newly Identified Threat Group
A new threat group, nicknamed LazyScripter, has been identified. An analysis of several malicious emails targeting individuals looking for work in Canada lead to its discovery....
U.S. Senate Hearing on SolarWinds Breach
Cybersecurity history is a neverending anthology. Cyberattacks have been taking place for decades, but the era known as the 'Information Age' has just set in only recently. The...
Major Venture Capital Firm Sequoia Capital Suffers Data Breach
Sequoia Capital, a major US venture capital firm, informed its investors on Friday that the company had suffered a data breach. Investors’ personal and financial information was...
California DMV Security Breach Investigation
The air surrounding cybersecurity right now is turbulent, to say the least. Malware threats, persistent malicious campaigns, and intrusions to data privacy are common occurrences...
Cl0p Ransomware Hits Famous Law Firm
In the cybersecurity world, a new decade of challenges looms ahead. Leading up to 2021, practically every sector imaginable has been hit with some sort of cybercrime disruption....
Masslogger Spyware Campaign Evolves
Online security is evolving quickly and threat teams are working tirelessly to deconstruct the workings of cybercriminals. This fact is making it increasingly difficult for...
Coronavirus Lockdowns Fuel Romance Scams
Romance scams has been on the rise during the pandemic, with criminals using online resources to target lonely people isolated due to lockdowns. The money lost last year to...
Agent Tesla Trojan Evolves to Include New Anti-Malware Evasion Capabilities
An upgraded version of the trojan, Agent Tesla, is available in criminal marketplaces. The trojan can now evade anti-malware software, as well as provide new command and control...
SIM-swapping Cybercriminals Steal Over $100 Million From Celebrities
Nowadays the meshing of the real world and the virtual world is very apparent when a malicious attacker's simple keystrokes can invoke considerable damage and disruption, as well...