Jack Dorsey Twitter Hack – How Can SIM Swap Be Stopped?

On Friday afternoon Jack Dorsey’s Twitter account was hacked – later identified as a SIM swap attack. With this type of fraud a hacker either convinces or bribes a carrier employee to switch the number associated with a SIM card to another device, at which point they can intercept any two-factor authentication codes sent by […]

Crypto Mining Malware Targeting Linux Servers

It has been reported that a coin-mining malware infection previously only seen on Arm-powered IoT devices has made the jump to Intel systems. Akamai senior security researcher Larry Cashdollar says one of his honeypot systems recently turned up what appears to be an IoT malware that targets Intel machines running Linux. It is fine-tuned for intel processors by establishing a […]

BEC Overtakes Ransomware And Data Breaches In Cyber-Insurance Claims

Business email compromise (BEC) has overtaken ransomware and data breaches as the main reason companies filed a cyber-insurance claim in the EMEA (Europe, the Middle East, and Asia) region last year, said insurance giant AIG. According to statistics published in July, AIG said that BEC-related insurance filings accounted for nearly a quarter (23%) of all cyber-insurance […]