Author: Cybernoz
At Help Net Security, we’ve been following the cybersecurity business landscape closely for the past 25 years. Through our Industry…
Feb 21, 2024NewsroomPhishing Attack / Information Warfare Cybersecurity researchers have unearthed a new influence operation targeting Ukraine that leverages spam…
Thank you for joining! Access your Pro+ Content below. 20 February 2024 Flying into cloud – EasyJet’s journey out of…
Russian authorities have detained a hacker named Aleksandr Ermakov, believed to be behind the notorious SugarLocker ransomware attacks, which have…
A deprecated authentication plug-in for VSphere, the enhanced authentication plug-in (EAP), carries two vulnerabilities, one critical, and should be disabled…
PSI Software SE, a German software developer for complex production and logistics processes, has confirmed that the cyber incident it disclosed…
[By Avkash Kathiriya, Senior Vice President, Research and Innovation at Cyware] There was a time when managed security service providers…
TruffleHog is an open-source scanner that identifies and addresses exposed secrets throughout your entire technology stack. “TruffleHog was originally a…
The government has agreed to bring in legislation to require MI5 and GCHQ to seek independent authorisation before accessing confidential…
HWL Ebsworth is facing an official investigation by Australia’s privacy watchdog following a cyber security incident last year. The investigation…
How do ransomware groups pick their targets? It’s a rhetorical question: in the vast majority of cases they don’t. Ransomware-as-a-service…
[By Tyler Shields, Vice President at Traceable AI] As we step into 2024, the landscape of API security is at…











