Hackers Shifting Towards Non-Executable .txt & .log Files
Recently, researchers have found an increasing number of malware samples that employ code from non-executable files (such as .txt, .log,...
Read more →Recently, researchers have found an increasing number of malware samples that employ code from non-executable files (such as .txt, .log,...
Read more →A threat actor allegedly published 4.1 million genetic data profiles stolen from the DNA testing company 23andMe in dark web...
Read more →An updated version of a sophisticated backdoor framework called MATA has been used in attacks aimed at over a dozen...
Read more →Object storage specialist Scality has become the first supplier to gain integration with VMware’s Cloud Director via OSIS (Object Storage...
Read more →Ragnar Locker Group Leak Site Seized! International law enforcement agencies from around the world have successfully seized the Ragnar Locker...
Read more →THE 11TH EDITION OF THE ENISA THREAT LANDSCAPE REPORT IS OUT! Pierluigi Paganini October 19, 2023 I’m proud to announce...
Read more →By Nicole Allen, Senior Marketing Executive at Salt Communications Probably now more than ever, secure communications are crucial for Policing...
Read more →New research this week has given warning to employees to be on alert to emails seemingly from human resources (HR)...
Read more →Sandu Diaconu (31, Moldova) has been sentenced to extradition and removal from the United Kingdom for his role in administering...
Read more →SAP has posted an increase of 16% in its cloud revenue to €3.7bn for the third quarter of 2023. The...
Read more →Healthcare solutions giant Henry Schein recently disclosed a cybersecurity incident that disrupted some of its business operations and may have...
Read more →Jupyter Notebooks exposed to the internet are being targeted by a new crypto jacking campaign called Qubit Strike, which Cado...
Read more →