Because the chat app doesn’t encrypt conversations by default—or at all for group chats—security professionals often warn against it.
Browsing CategorySecurity
Microsoft rolls out Application Guard for Office to all customers
Microsoft has announced that Application Guard for Office is now generally available for all Microsoft 365 users with supported licenses. […]
US charges NetWalker ransomware affiliate, seizes ransom payments
The U.S. Justice Department announced today the disruption of the Netwalker ransomware operation and the indictment of a Canadian national for alleged involvement in the file-encrypting extortion attacks. […]
Europol: Emotet malware will uninstall itself on March 25th
Law enforcement has started to distribute an Emotet module to infected devices that will uninstall the malware on March 25th, 2021. […]
Cops Disrupt Emotet, the Internet’s ‘Most Dangerous Malware’
A global operation has taken down the notorious botnet in a blow to cybercriminals worldwide.
Netwalker ransomware dark web sites seized by law enforcement
The dark web websites associated with the Netwalker ransomware operation have been seized by law enforcement from the USA and Bulgaria. […]
Linux malware uses open-source tool to evade detection
AT&T Alien Labs security researchers have discovered that the TeamTNT cybercrime group upgraded their Linux crypto-mining with open-source detection evasion capabilities. […]
Emotet botnet disrupted after global takedown operation
The infrastructure of today’s most dangerous botnet built by cybercriminals using the Emotet malware was taken down following an international coordinated action coordinated by Europol and Eurojust. […]
Here’s how a researcher broke into Microsoft VS Code’s GitHub
This month a researcher was awarded a bug bounty award of an undisclosed amount after he broke into the official GitHub repository of Microsoft Visual Studio Code.
A vulnerability in VS Code’s issue management function and a lack of authentication checks enabled the researcher to obtain push access, and write to the repository. […]
North Korea Targets—and Dupes—a Slew of Cybersecurity Pros
The sweeping campaign took advantage of the collaborative spirit among researchers, with an unknown number of victims.