If only you had to worry about malware, with Jason Haddix: Lock and Code S05E04
Today on the Lock and Code podcast… If your IT and security teams think malware is bad, wait until they learn about everything else. In…
Today on the Lock and Code podcast… If your IT and security teams think malware is bad, wait until they learn about everything else. In…
Hackers are exploiting a server-side request forgery (SSRF) vulnerability in Ivanti Connect Secure, Policy Secure, and ZTA gateways to deploy the new DSLog backdoor on…
Despite not being 0-day or even 1-day vulnerabilities, three well-known and outdated CVEs in Microsoft Word and Excel continue to pose a threat to the cybersecurity…
A mum of three opened up to DailyMail Australia a couple of years about how she was scammed out of $154,000 as a warning so others don’t…
South Korean researchers have publicly disclosed an encryption flaw in the Rhysida ransomware encryptor, allowing the creation of a Windows decryptor to recover files for…
Raspberry Robin is a malicious worm that spreads through USB drives, and it’s been actively used by the threat actors to download and install hidden…
Phishing has been one of the primary methods threat actors use for impersonating individuals or brands with a sense of urgency that could result in…
Microsoft, the renowned technology giant based in the United States, has recently made headlines due to targeted spear phishing campaigns aimed at thousands of individual…
12 Feb 90+ Cyber Crime Statistics 2024: Cost, Industries & Trends This week in cybersecurity from the editors at Cybercrime Magazine – Read today’s full…
The Federal Communications Commission (FCC) has announced that calls made with voices generated with the help of Artificial Intelligence (AI) will be considered “artificial” under…
By Published: 12 Feb 2024 As an enterprise-focused developer advocate, a major part of my role involves helping organisations identify and remove silos in their…
A new backdoor written in Rust has been discovered to target macOS users with several interesting features. Moreover, there have been 3 variants of backdoor…