North Korean Hackers Attack Cybersecurity Specialists by Offering Them Jobs via LinkedIn

Mandiant experts noticed that North Korean hackers have focused their attention and attacks on information security specialists. Attackers try to infect researchers with malware in the hope of infiltrating the networks of companies that the targets work for. Let me remind you that we also wrote that Nearly 50% of Cybersecurity Leaders Will Change Jobs… Continue reading North Korean Hackers Attack Cybersecurity Specialists by Offering Them Jobs via LinkedIn

Hackers majorly use Microsoft and DHL brands in phishing attacks

Hackers majorly use the Microsoft and DHL brands in phishing attacks. In Q4 2020, cybercriminals used more brands from the tech industry, followed by shipping and retail businesses. Information security researchers from the Check Point Software team said that phishers love the Microsoft brand. 43% of all attempts at phishing attacks were associated with it… Continue reading Hackers majorly use Microsoft and DHL brands in phishing attacks

Linus Torvalds approved exclusion of the terms slave, blacklist and others from the Linux kernel code

More recently, we talked that the IT community has also returned to discussing inappropriate and offensive terminology under the influence of Black Lives Matter protests that swept across the United States (and not only). Linus Torvalds did not stand aside and approved excluding the terms slave, blacklist, and others from the Linux kernel code. Many… Continue reading Linus Torvalds approved exclusion of the terms slave, blacklist and others from the Linux kernel code