Exploring the root causes of the cybersecurity skills gap
In this Help Net Security interview, Koma Gandy, VP of Leadership and Business at Skillsoft, addresses the critical aspects of the cybersecurity skills gap, the…
In this Help Net Security interview, Koma Gandy, VP of Leadership and Business at Skillsoft, addresses the critical aspects of the cybersecurity skills gap, the…
Researchers have discovered a critical flaw in the cryptographic schema of the DoNex ransomware and all of its variants and predecessors. Since then, they have…
Australian investigations into the breach of two organisations in 2022 form the basis of an international advisory on APT40, a state-sponsored threat group linked to…
08 Jul Make Threat Hunting Easier With Endpoint Detection and Response (EDR) Posted at 18:30h in Blogs by Di Freeze Why many CISOs are turning…
RockYou2024 compilation containing 10 billion passwords was leaked online Pierluigi Paganini July 08, 2024 Threat actors leaked the largest password compilation ever, known as RockYou2024,…
In an ongoing extortion campaign against Ticketmaster, threat actors have leaked almost 39,000 print-at-home tickets for 150 upcoming concerts and events, including Pearl Jam, Phish, Tate…
Over 600 taxpayers fell afoul of an automated system the ATO used to revive old debts and get them paid out of tax refunds, after…
Computer hardware maker Zotac has exposed return merchandise authorization (RMA) requests and related documents online for an unknown period, exposing sensitive customer information. Zotac, known…
A recently passed Pennsylvania law aims to bolster consumer protections in the aftermath of data breaches. Act 33 of 2024, which is set to take…
Reserve Bank of Australia has outlined plans to outsource the migration of “all workloads” from an on-premises to third-party data centre under its core modernisation…
08 Jul Make Threat Hunting Easier With Endpoint Detection and Response (EDR) Posted at 17:01h in Blogs by Di Freeze Should you switch from a…
A trojanized version of jQuery has been spreading on the npm JavaScript package manager, GitHub and elsewhere, for use in a jQuery attack, security researchers…