Emerging trends and strategies in digital forensics
In this Help Net Security interview, Amber Schroader, CEO at Paraben Corporation, discusses the challenges posed by the complexity of modern computer systems and networks…
In this Help Net Security interview, Amber Schroader, CEO at Paraben Corporation, discusses the challenges posed by the complexity of modern computer systems and networks…
The past year saw developments and updates to privacy regulations across the globe—from India’s Personal Data Protection Bill to Brazil’s General Data Protection Law, according…
The company now claims that allowing third-party ink cartridges in its printers would expose them to viruses and malware. Hewlett-Packard (HP) claims to have laptops…
Yearly Intel Trend Review: The 2023 RedSense report Pierluigi Paganini January 25, 2024 The 2023 RedSense report covers long-term observations we have made regarding intel…
Genetic testing provider 23andMe confirmed that hackers stole health reports and raw genotype data of customers affected by a credential stuffing attack that went unnoticed…
Microsoft and Hewlett-Packard Enterprise (HPE) both recently disclosed that they suffered corporate email breaches at the hands of Russia’s “Midnight Blizzard” hackers. The group, which…
An ongoing campaign of malicious ads has been targeting Chinese-speaking users with lures for popular messaging applications such as Telegram or LINE with the intent…
ThreatDown Endpoint Protection (EP) achieved the highest possible score (100%) and received certifications for Level 1, Exploit, Online Banking, and Ransomware in the most recent…
Members Equity Bank (ME Bank) has restored its app and Internet banking services after a near 29-hour outage blamed on an unspecified “technical issue”. The…
A previously unknown advanced threat actor tracked as ‘Blackwood’ is using sophisticated malware called NSPX30 in cyberespionage attacks against companies and individuals. The adversary has…
Researchers have discovered a new loophole in Google Kubernetes Engine (GKE), which threat actors can utilize with a Google account to take over the misconfigured…
Ransomware, data breaches and fraud are unabating, with cyber insecurity as well as misinformation and disinformation being the top and fourth risks, respectively, for the…