Hackers Using Secure USB Drives to Attack Government Entities
An ongoing attack on government agencies in the APAC region has been claimed to have compromised a secure USB device with hardware encryption. The nation’s…
An ongoing attack on government agencies in the APAC region has been claimed to have compromised a secure USB device with hardware encryption. The nation’s…
The era of AI has proven that machine learning technologies have a unique and effective capability to streamline processes that alter the ways we live…
Microsoft has been experimenting with glass as a data storage medium for some years, and is now pivoting that research towards long-term data centre storage.…
It’s always DNS. That’s what the famous internet meme popular among sysadmins says anyway. It’s funny because while clearly, every network issue doesn’t resolve to…
Cybersecurity could be as easy as 1-2-3. The problem, though, is that people have to want it. Cybersecurity could be as easy as 1-2-3. The…
Oct 19, 2023NewsroomCyber Threat / Vulnerability A number of state-back threat actors from Russia and China have been observed exploiting a recent security flaw in…
In many cases, senior executives/line-of-business leaders are minimally engaged in their company’s cyber preparedness initiatives — only 33% of CEOs or managing directors and 21%…
Threat actors are doubling down on brand impersonation by using lookalike domain names. Threat actors are known for impersonating popular brands in order to trick users.…
Over 80% of northern European organizations emphasize that the need to ensure business resilience is the top driver for their cybersecurity investments, according to Nixu.…
The critical bug in some Citrix NetScaler products patched last week remains under exploitation, according to security researchers from Mandiant. The Google subsidiary said post-patch,…
The FBI also warns that cybercriminals are using this stolen data to extort victims, threatening to release it to the public or to the victims’…
Oracle’s quarterly patch release fixes an eye-watering 387 security vulnerabilities, but only 14 of them are rated critical (with a CVSS score greater than 9).…