Cryptojacking – The Parasitical Crime
Infosecurity – Cryptojacking doesn’t destroy data. Instead, it chews up computing resources. Danny Bradbury asks whether criminals have finally found a largely victimless crime
China-Based Cyber Espionage Campaign Targets Satellite, Telecom, Defense Firms
Dark Reading – Threat group Thrip is using three computers based in China to steal data from targeted companies in Southeast Asia and the US, Symantec says. An advanced persistent threat group that is believed to be operating out of China is conducting a wide-ranging cyber espionage campaign targeting satellite, telecommunications, and defense organizations mostly in Southeast Asia and the United States.
Imperva Claims About Auth0 Are Misleading At Best
Stop the presses. Forbes – A blog post from Imperva filed under “Research” makes the breathless claim that the author was able to impersonate someone else and execute a cross-site scripting phishing scam by exploiting flaws in the Auth0 identity-as-a-service platform.
Are Smart Cities a Smart Choice?
New Indian Express – Centralizing surveillance, utilities and other essential services can potentially do more harm than good.
Phishing Attacks with Auth0? Facts First
Auth0 Blog – A security researcher claimed that an attacker could perpetrate a phishing scam that could target a company using the Auth0 platform based on domain. Learn about this attack, the prevalence of phishing in the industry, and how to mitigate these scams.

