Lucian Constantin

CSO Senior Writer

Lucian Constantin writes about information security, privacy, and data protection for CSO.

Defenders can discover phishing sites through web analytics IDs

Attackers phish Office 365 users with fake voicemail messages

Attackers phish Office 365 users with fake voicemail messages

Recent phishing campaigns have combined a clever use of fake voicemail, phony Microsoft email, and off-the-shelf phishing kits to target high-value victims.

Credential stuffing explained: How to prevent, detect and defend against it

Credential stuffing explained: How to prevent, detect and defend against it

The automated use of breached usernames and passwords to access accounts is low risk, high reward for cybercriminals. Here's how to make it harder for them to use credential stuffing.

Cryptojacking worm infects exposed Docker deployments

Cryptojacking worm infects exposed Docker deployments

Graboid is the first known instance of a cryptomining worm used to create botnets spread using containers.

Report: China supported C919 airliner development through cyberespionage

Report: China supported C919 airliner development through cyberespionage

Chinese hackers and intelligence agencies coordinated cyberattacks to gather intellectual property of aerospace firms to gain competitive advantage.

GandCrab cousin Sodinokibi made a fortune for ransomware pushers

GandCrab cousin Sodinokibi made a fortune for ransomware pushers

By tracking down bitcoin wallets, researchers estimate that the Sodinokibi creators pocketed at least $4.5 million.

Critical remote code execution flaw fixed in popular terminal app for macOS

Critical remote code execution flaw fixed in popular terminal app for macOS

Users of the iTerm2 terminal app are encouraged to update as soon as possible.

Zero-day vulnerability gives attackers full control of Android phones

Zero-day vulnerability gives attackers full control of Android phones

Attackers are reportedly exploiting an unpatched vulnerability to take control of Android devices and potentially deliver spyware. The flaw affects phones models from multiple manufacturers including Google, Samsung, Huawei, LG and...

Cobalt cybercrime group might be launching Magecart skimming attacks

Cobalt cybercrime group might be launching Magecart skimming attacks

Researchers link Magecart-based skimming attacks to Cobalt (a.k.a. Carbanak), whose cyber attacks have netted millions of dollars.

Chinese cyberespionage group PKPLUG uses custom and off-the-shelf tools

Chinese cyberespionage group PKPLUG uses custom and off-the-shelf tools

A previously unknown group or collective associated with China is targeting victims in Asia, possibly for geopolitical gain.

Magecart web skimming group targets public hotspots and mobile users

Magecart web skimming group targets public hotspots and mobile users

IBM researchers discover new Magecart scripts suggest planned advertisement injection through Wi-Fi and supply chain attacks.

Secrets of latest Smominru botnet variant revealed in new attack

Secrets of latest Smominru botnet variant revealed in new attack

Researchers gained access to a Smominru command-and-control server to get details on compromised devices and scope of the attack.

Load More