Breaking the Cycle of Traditional Vulnerability Management
As our reliance on technology continues to grow, so does the sophistication and prevalence of cyber threats. And with each technological advancement, new vulnerabilities and…
As our reliance on technology continues to grow, so does the sophistication and prevalence of cyber threats. And with each technological advancement, new vulnerabilities and…
19 Jun Cybercrime Surges As Security Spending Falls Short In Thailand Posted at 09:03h in Blogs by Di Freeze This week in cybersecurity from the…
Pure Storage will upgrade its Fusion control plane to make storage capacity across its arrays available via storage classes that allow it to be easily…
Hackers often abuse weaponized Word docs, as they can contain macros that contain or exploit flaws inside those Word files to run destructive code upon…
Hackers are offering “free” mobile data access on Telegram channels by exploiting loopholes in telecom provider policies, which target users in Africa and Asia and…
Jun 19, 2024NewsroomCybercrime / Cryptocurrency A threat actor who goes by alias markopolo has been identified as behind a large-scale cross-platform scam that targets digital…
Several phishing campaign kits have been used widely by threat actors in the past. One popular PhaaS (Phishing-as-a-Platform) was Caffeine, which was first identified and…
Jun 19, 2024The Hacker NewsGDPR Compliance / Data Privacy Are your tags really safe with Google Tag Manager? If you’ve been thinking that using GTM…
Google has released a critical security update for its Chrome browser, addressing six high-severity vulnerabilities that could potentially lead to browser crashes and other serious…
The notorious IntelBroker hacker, who has previously been linked to high-profile breaches of major companies and government entities, has claimed to have breached Apple Inc.…
Cryptocurrency users are being targeted with legitimate-looking but fake apps that deliver information-stealing malware instead, Recorder Future’s researchers are warning. The threat actor behind this…
Jun 19, 2024NewsroomMalware / Cyber Attack Chinese-speaking users are the target of a never-before-seen threat activity cluster codenamed Void Arachne that employs malicious Windows Installer…