In an unprecedented event, officials and legislators from 25 countries, including the United States, Mexico, Canada, India, the European Union, Singapore, South Africa and Japan, met virtually for the creation of the Counter Ransomware Initiative, recognizing this cybercriminal practice as one of the most important threats globally, capable of generating…


Avanan cybersecurity specialists report the of a new method in which threat actors look for susceptible targets among low-ranking employees who have access to an organization’s IT structure.

Usually, a phishing attack involves the usurpation of the identity of a senior executive in an organization, which makes sense if we…


To every single Public Relationships crisis it goes through, tries to respond with improvements to its service, especially in terms of user privacy and information security. The most recent of these improvements was dubbed Facebook Protect, a new feature that the social media giant has begun suggesting to its users.


The Office of the Australian Information Commissioner (OAIC) confirmed that convenience store chain 7-Eleven violated the privacy of thousands of customers by collecting sensitive biometric data without prior consent between June 2020 and August 2021.

During the aforementioned period, the company conducted thousands of surveys using electronic tablets with integrated…


Through a letter sent via email, Google has notified some 14,000 users that during the past months they could have been the target of a sophisticated spear phishing campaign operated by a hacking group identified as APT28. …


Cybersecurity specialists report the detection of a new Iranian hacking group that has been employing a never seen before variant of remote access Trojan (RAT). The cybercriminal group was identified as MalKamak and the campaign is known as Operation GhostShell.

The , identified by security firm Cybereason, was first detected…


Cryptocurrency enthusiasts are always exposed to all sorts of scams, and one of the most common is when a virtual asset developer simply disappears with their investors’ money. Unfortunately, non-fungible tokens (NFT) are not exempt from this fraud variant, as evidenced by a project called Evolved Apes.

Its developers claimed…


Cybersecurity specialists report the detection of 3 vulnerabilities in various products of the technology firm Honeywell. According to the report, successful exploitation of these flaws would allow the deployment of denial of service (DoS) attacks and remote code execution.

To be precise, the vulnerabilities reside in Experion Process Knowledge System…


A report presented by Kaspersky Labs experts points to the detection of a Chinese cyberespionage group that has attacked multiple targets in South Asia since mid-2020. …


This week unveiled its open-source static analysis tool used by its cybersecurity teams to detect potential security flaws in and Java apps. Dubbed as Mariana Trench, this tool is capable of analyzing millions of lines of code in a short time and thus prevents failures from reaching end users.

The…

Eli Cyber Security

Knowledge belongs to the world

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store