Revealed: Saudis suspected of phone spying campaign in US
www.theguardian.com/world/2020/mar/29/revealed-saudis-suspected-of-phone-spying-campaign-in-us Saudi Arabia appears to be exploiting weaknesses in the global mobile telecoms network to track its citizens as they travel around the US, according to a whistleblower who has shown the Guardian millions of alleged secret tracking requests.
Emotet: Dangerous Malware Keeps on Evolving
medium.com/threat-intel/emotet-dangerous-malware-keeps-on-evolving-ac84aadbb8de Emotet is one of the most dangerous malware threats active today. Emotet (Trojan.Emotet) began life as a banking Trojan but evolved several years ago to act as a malware loader for other threats Emotet infects a machine and then downloads another threat e.g. the TrickBot information stealer, onto the infected system. Emotet is now one of the biggest threat distributors out there, renting its
Work from home: Videoconferencing with security in mind
www.welivesecurity.com/2020/03/30/work-from-home-videoconferencing-security-in-mind/? At the time of writing one-third of the worlds population is enduring restricted movement to stem the spread of COVID-19. The lockdown has driven huge swaths of the working population to become remote workers, many for the first time. The sudden surge in employees, students, teachers, and many other professionals working from home is driving a huge increase in demand for videoconferencing, online
COVID-19 Impact: Cyber Criminals Target Zoom Domains
blog.checkpoint.com/2020/03/30/covid-19-impact-cyber-criminals-target-zoom-domains/ While the world is struggling with the Coronavirus outbreak, many countries have implemented precautionary measures. Schools are being closed, communities are asked to shelter-in-place, and many organizations have enabled their employees to work remotely. As a result, video communication platforms are the daily norm. As the interest and usage of these platforms increases, cyber criminals stay a step . ahead. For instance, Check Point Research recently discovered a technique which could have allowed a threat actor to identify and join active Zoom meetings.