article thumbnail

Cybersecurity Event Cancelled After Being Hit By Cybercriminals

Joseph Steinberg

An online cybersecurity event with 2,500 people already logged in had to be cancelled after suspected cybercriminals launched a social engineering attack in the event’s chat window. Shortly after such messages appeared, the AICD, in order to protect attendees, cancelled the event, and contacted local law enforcement.

article thumbnail

Another Event-Related Spyware App

Schneier on Security

This month, it’s Egypt’s COP27 Summit app : The app is being promoted as a tool to help attendees navigate the event. Last month, we were warned not to install Qatar’s World Cup app because it was spyware. But it risks giving the Egyptian government permission to read users’ emails and messages.

Spyware 327
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Upcoming Speaking Events

Schneier on Security

The event will take place at the Massachusetts Institute of Technology in Room 32-G449 (Kiva), as well as online via Zoom. Please register in advance if you plan to attend (whether online or in person).

article thumbnail

Critical SQL Injection Vulnerability Discovered in ‘The Events Calendar’ WordPress Plugin (CVE-2024-8275)

Penetration Testing

A severe security flaw has been identified in the popular WordPress plugin The Events Calendar, affecting all versions up to and including 6.6.4.

article thumbnail

Scam Information and Event Management

SecureList

Malicious directory in Explorer After installing all the necessary files, the implant establishes persistence using WMI by creating filters which are activated by common events — common enough to guarantee filter activation. As a result, the user will not be able to view the contents of the directory. Trojan.BAT.Agent.cix Trojan.BAT.Miner.id

Scams 141
article thumbnail

Black Hat Roundup 2024: What to Expect From This Week’s Security Events

Tech Republic Security

Discover the latest cybersecurity trends and techniques in this year’s Black Hat and DEF CON roundup.

article thumbnail

Summer Olympics: What IT Teams Need to Do Before & During the Event for Their Businesses

Tech Republic Security

Remind employees to be wary of fake apps and too-good-to-be-true streaming options on the eve of the Games.

eCommerce 199