Hackers Switch Weaponized Office Document to CHM & LNK Files
Malware distribution methods have changed significantly in the cyber threat landscape. Data analysis shows that Microsoft Office document files are no longer the preferred medium…
Malware distribution methods have changed significantly in the cyber threat landscape. Data analysis shows that Microsoft Office document files are no longer the preferred medium…
A New York-based healthcare has been found asking its incoming patients to seek medical assistance in other facilities due to a possible cyberattack scar. In…
IT admins can be considered culpable for weak password use if they fail to enforce strong password policies or neglect proper security measures. Their responsibility…
A recently patched critical-severity vulnerability in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway had been exploited as a zero-day since August, Google’s Mandiant…
Twitter, now renamed X, is testing new $1 annual subscriptions to provide unverified accounts access to core features like tweeting and retweeting. This move is…
Cybercriminals are known to exploit malicious advertising techniques for targeting the widely-used Notepad++ text editor for Windows. This could lead to the dissemination of ransomware…
Oct 18, 2023NewsroomCyber Espionage / Malware Government entities in the Asia-Pacific (APAC) region are the target of a long-running cyber espionage campaign dubbed TetrisPhantom. “The…
The contract that subpostmasters were forced to sign by the Post Office was so weighted against them that the organisation’s contracts manager said he would…
In a concerning cybersecurity event, Chile finds itself at the center of a growing cyber threat from various ransomware groups. These groups, though not officially,…
Evan Goldberg, executive vice-president of Oracle NetSuite, advocated a slew of traditional “old-school” machine learning and generative AI (GenAI) products as offering ways for customers…
Maritime cyberattacks are alarmingly increasing! In a recent eye-opening study, maritime cybersecurity firm CyberOwl joined forces with global law firm HFW to shed light on…
Intelligence agencies from across the anglophone Five Eyes alliance have come together to outline guidance on how organisations at risk of cyber intrusions conducted by…