Security Think Tank: Four steps to secure remote workers
In a post-Covid world all organisations have had to adapt to new ways of working. The transition to remote working was fast paced, reactive and…
In a post-Covid world all organisations have had to adapt to new ways of working. The transition to remote working was fast paced, reactive and…
The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer malware, and its new variant was being marketed in underground communities. Threat actors use…
Dec 01, 2023NewsroomMalware / Cyber Espionage A suspected Chinese-speaking threat actor has been attributed to a malicious campaign that targets the Uzbekistan Ministry of Foreign…
Almost 60% of workers in the UK have had no training in digital skills, according to research by CV Genius. Looking into data from several…
Zyxel has patched six vulnerabilities affecting its network attached storage (NAS) devices, including several (OS) command injection flaws that can be easily exploited by unauthenticated…
Dec 01, 2023The Hacker NewsMalware / Cyber Threat The U.S. Department of Justice (DOJ) and the FBI recently collaborated in a multinational operation to dismantle…
CISA adds ownCloud and Google Chrome bugs to its Known Exploited Vulnerabilities catalog Pierluigi Paganini December 01, 2023 US CISA added ownCloud and Google Chrome vulnerabilities…
Black Basta, the fourth-most active ransomware strain with more than 329 victims, has reportedly made over $100 million in ransom payments. This ransomware has also…
Today marks the day when Google makes good on its new policy to reserve the right to delete inactive accounts after two years of inactivity.…
According to a recent report by Secureworks, a well-planned and advanced phishing attack was carried out, specifically targeting hotels and their guests, through the popular…
Dec 01, 2023The Hacker NewsNetwork Security / Cyber Attack The most recent Gcore Radar report and its aftermath have highlighted a dramatic increase in DDoS…
Zoom, the most widely used video conferencing platform has been discovered with a critical vulnerability that threat actors could potentially exploit for various malicious purposes.…