First Ever iOS Trojan Steals Facial Recognition Data
A novel, very sophisticated mobile Trojan dubbed GoldPickaxe.iOS that targets iOS users exclusively was discovered to collect facial recognition data, intercept...
Read more →A novel, very sophisticated mobile Trojan dubbed GoldPickaxe.iOS that targets iOS users exclusively was discovered to collect facial recognition data, intercept...
Read more →Protecting against credential stuffing attacks requires a multi-layered approach to security. Here are some effective strategies to defend against such...
Read more →When Elon Musk’s ambitions to transform X into an “everything app” were divulged last year, he joined several companies known...
Read more →Feb 19, 2024NewsroomCyber Espionage / Vulnerability Threat actors operating with interests aligned to Belarus and Russia have been linked to...
Read more →ETISALAT, the state-owned Emirates Telecommunications Group Company PJSC in the UAE, is reportedly grappling with a ransomware assault attributed to...
Read more →SolarWinds has patched five remote code execution (RCE) vulnerabilities in its Access Rights Manager software, three of which are rated...
Read more →We had a great conversation during February’s UL Mid-month Meetup, where we discussed our careers, how vulnerable they were to...
Read more →70% of businesses report that fraud losses have increased in recent years and over half of consumers feel they’re more...
Read more →Feb 19, 2024NewsroomMalware / Cyber Espionage The Iranian-origin threat actor known as Charming Kitten has been linked to a new...
Read more →A 15-hour outage of parliamentarians’ expense system in January has been attributed to an unpaid invoice. The cause of the...
Read more →Property developers could be required to consider mobile coverage during planning of housing developments larger than 50 dwellings. The federal...
Read more →Nine months after announcing it would require telcos to use a Sender ID Registry to combat SMS spam, the government...
Read more →