No one — gamer, cryptocurrency investor, or online shopper — is safe from scammers. But no matter who the victim is or how sophisticated the scheme may be, there is always a way to sniff out fraud before it’s too late. Today we’re looking at five common signs of online scams to help you avoid…

This brings the total raised so far to $57 million (seed plus Series A). Cylus logoCylus follows the now standard template for Israeli firms – founded by former Israeli Defense Force (IDF) cyber specialists before expanding into the U.S. market. Current CEO Amir Levintal was Director of the Cyber R&D Division of the IDF’s Elite…

Eighteen cybersecurity-related acquisitions were announced December 1-12, 2021. Acclaim Technical Services acquires Entegra Systems Acclaim Technical Services (ATS), which specializes in operational support, language, and technology services, has acquired cyber technology solutions provider Entegra Systems. Both companies are US-based government contractors, and the acquisition of Entegra, which provides services to defense and intelligence agencies, will…

Cross-site leaks, also known as XS-Leaks, are a type of browser side-channel attack that can allow a malicious website to infer and collect potentially sensitive user information from other sites by bypassing security mechanisms such as same-origin policy. Same-origin policy is designed to restrict how a document, script or media file loaded by one origin…

Facebook removed over 800 accounts, pages and groups from the social media platform for engaging in what the company calls coordinated inauthentic behavior. Other accounts were taken down for brigading and mass reporting. The largest number of removed Facebook accounts, pages, and groups (548 in total, alongside 86 Instagram accounts) were associated with a network…

The attack, the Rockville, Maryland-based company says, likely happened in mid-November, when a ransomware group accessed data on certain systems, deployed malware to prevent access to files, and then threatened to leak the exfiltrated files. Despite that, Supernus Pharmaceuticals says it did not experience a significant impact on its business, as its operations were not…

A local elevation of privilege vulnerability (CVE-2021-41379) in the Windows Installer that Microsoft supposedly fixed on November 2021 Patch Tuesday is, according to its discoverer, still exploitable. What’s more, it is already being leveraged by malware developers. About the flaw and the exploit Abdelhamid Naceri, who reported the flaw through the Trend Micro Zero Day…

5G has the potential to deliver incredible innovations — from smart cities to self-driving cars to advances in healthcare, manufacturing, and other key verticals. While 5G improves upon previous generations’ cybersecurity vulnerabilities, it also brings new risks: 5G is software-defined. The increased role of software in 5G makes it more susceptible to dynamic, software-based attacks…

The new investment round was led by Bessemer Venture Partners and SYN Ventures. Existing investors Andreessen Horowitz, Harpoon Ventures, Mango Capital, and Wing Venture Capital also contributed. The network security firm says it will use the capital for the development of new technology and for channel expansion. The company says it also plans to invest…

Many organizations find themselves in a tricky spot today when it comes to digital transformation. With many looking to zero trust, how does Secure Access Secure Edge (SASE) fit in? On the one hand, the events of 2020 helped to speed up many digital adoption projects. A 2020 report from McKinsey found that more than…