Remove Phishing Remove Surveillance Remove VPN
article thumbnail

Weekly Update 166

Troy Hunt

References The Norwegian government is now on HIBP (that's now the 6th gov, the 7th will be announced in the coming days) Banks are communicating in precisely the fashion they're warning their customers about (is it a phish, or banks comms? Mass surveillance is a reality. A VPN can't solve this issue, but it's a great first step.

VPN 248
article thumbnail

ScarCruft surveilling North Korean defectors and human rights activists

SecureList

The victim was infected by PowerShell malware and we discovered evidence that the actor had already stolen data from the victim and had been surveilling this victim for several months. Spear-phishing document. After a Facebook conversation, the potential target received a spear-phishing email from the actor. Modified time.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Privacy Roundup: Week 13 of Year 2025

Security Boulevard

Surveillance Tech in the News This section covers surveillance technology and methods in the news. Privacy Without Compromise: Proton VPN is Now Built Into Vivaldi Vivaldi Vivaldi integrates ProtonVPN natively into its desktop version of its browser. Private search engines generally avoid connecting users to their searches.

VPN 59
article thumbnail

Security Affairs newsletter Round 507 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

CISA adds Aviatrix Controllers vulnerability to its Known Exploited Vulnerabilities catalog ESET detailed a flaw that could allow a bypass of the Secure Boot in UEFI systems Russia-linked APT Star Blizzard targets WhatsApp accounts Prominent US law firm Wolf Haldenstein disclosed a data breach Clop Ransomware exploits Cleo File Transfer flaw: dozens (..)

Spyware 70
article thumbnail

Privacy Roundup: Week 12 of Year 2025

Security Boulevard

Surveillance Tech in the News This section covers surveillance technology and methods in the news. Additionally, Arcane steals a wide range of user data, including VPN account credentials, gaming client information, messaging apps, and information stored in various web browsers.

article thumbnail

Australia, Canada, New Zealand, and the U.S. warn of PRC-linked cyber espionage targeting telecom networks

Security Affairs

Strong segmentation with firewalls and DMZs, securing VPN gateways, and ensuring encrypted traffic with TLS v1.3 Organizations should adopt secure password storage, phishing-resistant MFA, session token limits, and Role-Based Access Control (RBAC). are essential for protecting data. The investigation into the breaches of the U.S.

article thumbnail

Security Affairs newsletter Round 499 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

A cyberattack on gambling giant IGT disrupted portions of its IT systems China-linked APT Gelsemium uses a new Linux backdoor dubbed WolfsBane Microsoft seized 240 sites used by the ONNX phishing service U.S.