How to Spot Whaling Attacks: Safeguarding Against Targeted Cyber Threats
Cyber threats these days have evolved beyond simple phishing attempts, as attackers are be-coming more sophisticated and targeted in their...
Read more →Cyber threats these days have evolved beyond simple phishing attempts, as attackers are be-coming more sophisticated and targeted in their...
Read more →Jul 28, 2023THNSoftware Security / Data Safety Cybersecurity agencies in Australia and the U.S. have published a joint cybersecurity advisory...
Read more →The storm over the Chinese cyber attack on US officials, thanks to the Microsoft cybersecurity breach that compromised the MS...
Read more →The purple fox malware has been active since 2018, adopting a new technique to deliver its payload through MS SQL...
Read more →Jul 28, 2023THNSoftware Security / Zero Day Users of Metabase, a popular business intelligence and data visualization software package, are...
Read more →Here’s a look at the most interesting products from the past week, featuring releases from BreachRx, Darktrace, Dig Security, Panorays,...
Read more →In the wake of increased workforce mobility, today’s organizations require more innovative, more flexible, and more secure methods of granting...
Read more →Telstra has appointed a new group owner of IT strategy and transformation, securing the services of Suzanne Aitken from Digital...
Read more →A patch is now available for an Ivanti EPMM vulnerability that was used in a cyberattack on the ICT platform...
Read more →Microsoft has found itself the target of an European Union antitrust investigation over the bundling of its chat and video...
Read more →Zimbra addressed a zero-day vulnerability exploited in attacks aimed at Zimbra Collaboration Suite (ZCS) email servers. Two weeks ago Zimbra...
Read more →While consumers are usually the ones worried about their information being exposed in data breaches, it’s now the hacker’s turn,...
Read more →