Trump Terminates DHS Advisory Committee Memberships, Disrupting Cybersecurity Review

The new Trump administration has terminated all memberships of advisory committees that report to the Department of Homeland Security (DHS). “In alignment with the Department of Homeland Security’s (DHS) commitment to eliminating the misuse of resources and ensuring that DHS activities prioritize our national security, I am directing the termination of all current memberships on […]

Continue reading


Cybersecurity agency recommends list of apps to guard against malware, phishing attacks

SINGAPORE: The Cyber Security Agency of Singapore (CSA) has refreshed its list of recommended security apps that members of the public can use to safeguard their devices against malware attacks and phishing. The list contains six apps that are available on either Android or iOS devices: Avast Antivirus & Security, AVG Antivirus & Security, Norton360 Antivirus & Security and Sophos Intercept […]

Continue reading


YouTube Hack Attack Warning—What 2.5 Billion Users Need To Know

With 2.5 billion users worldwide, Google’s YouTube is undoubtedly the most popular video platform on the planet. And not just with legitimate users. I recently reported how hackers were going after YouTube creator accounts as part of an ongoing credential-stealing attack. Now, according to newly published security research, it appears that the threat has evolved with attackers using YouTube […]

Continue reading


100 Million macOS Users At Risk – New Banshee Malware Attacks Bypassing Apple’s XProtect

Researchers analyzed new versions of the Banshee macOS Stealer sample that initially evaded detection by most antivirus engines, as analysis revealed that the malware employed a unique string encryption technique. The encryption method was identical to that used by Apple’s XProtect antivirus engine for encrypting YARA rules within its binaries. By leveraging this shared encryption algorithm, Banshee […]

Continue reading


Google Security Alert As Backdoor VPN Threat Confirmed

Google’s managed defense team, working to empower the Google security operations community, has published a technical deep-dive into a confirmed malware threat that acts as a backdoor supporting commands involving supports commands keylogging, screen capture, audio capture, remote shell and file transfer as well as file execution. The malware, known as playfulghost, has been observed […]

Continue reading


US proposes cybersecurity rules to limit impact of health data leaks

Health care organizations may be required to bolster their cybersecurity to better prevent sensitive information from being leaked by cyberattacks like the ones that hit Ascension and UnitedHealth, a senior White House official said Friday. Anne Neuberger, the U.S. deputy national security adviser for cyber and emerging technology, told reporters that proposed requirements are necessary […]

Continue reading