Security Threats and Information
WeLiveSecurity
- Going (for) broke: 6 common online betting scams and how to avoid them 28.01.2025
- The evolving landscape of data privacy: Key trends to shape 2025 23.01.2025
- PlushDaemon compromises supply chain of Korean VPN service 22.01.2025
- Under lock and key: Protecting corporate data from cyberthreats in 2025 21.01.2025
- UEFI Secure Boot: Not so secure 16.01.2025
- Under the cloak of UEFI Secure Boot: Introducing CVE-2024-7344 16.01.2025
- Cybersecurity and AI: What does 2025 have in store? 15.01.2025
- Protecting children online: Where Florida’s new law falls short 14.01.2025
- Crypto is soaring, but so are threats: Here’s how to keep your wallet safe 09.01.2025
- State-aligned actors are increasingly deploying ransomware – and that’s bad news for everyone 07.01.2025
Krebs on Security
- Infrastructure Laundering: Blending in with the Cloud 30.01.2025
- A Tumultuous Week for Federal Cybersecurity Efforts 28.01.2025
- MasterCard DNS Error Went Unnoticed for Years 22.01.2025
- Chinese Innovations Spawn Wave of Toll Phishing Via SMS 16.01.2025
- Microsoft: Happy 2025. Here’s 161 Security Updates 14.01.2025
- A Day in the Life of a Prolific Voice Phishing Crew 07.01.2025
- U.S. Army Soldier Arrested in AT&T, Verizon Extortions 31.12.2024
- Happy 15th Anniversary, KrebsOnSecurity! 29.12.2024
- Web Hacking Service ‘Araneida’ Tied to Turkish IT Firm 19.12.2024
- How to Lose a Fortune with Just One Bad Click 18.12.2024