Police Bank lands new CIO – Finance – Training & Development
Police Bank has appointed experienced fintech leader Lyndall Bushell as its new chief information officer. The bank officially announced the news via LinkedIn. It said Bushell…
Police Bank has appointed experienced fintech leader Lyndall Bushell as its new chief information officer. The bank officially announced the news via LinkedIn. It said Bushell…
Google’s security researcher Tavis Ormandy discovered a new vulnerability impacting AMD Zen2 CPUs that could allow a malicious actor to steal sensitive data, such as…
Due to an unauthenticated critical RCE bug, formerly exploited as a zero-day in the wild by the threat actors, thousands of Citrix Netscaler ADC and…
Google is to start a pilot program to have employees work without internet access as a way to decrease the risk of cyberattacks. According to…
Afterpay is using four key platforms to help new members of its customer service teams to get up to speed quickly and be serving customers…
The North Korean state-sponsored Lazarus hacking group is breaching Windows Internet Information Service (IIS) web servers to hijack them for malware distribution. IIS is Microsoft’s…
The Virustotal platform has issued an apology and provided an update regarding a recent incident of accidental data exposure. VirusTotal was established in 2004 as…
Increased botnet activity targeting vulnerability(CVE-2023-28771) in Zyxel devices has become a major concern to its users. This vulnerability lets the unauthorized attacker execute the arbitrary…
A quick search for “ChatGPT” on the dark web and Telegram shows 27,912 mentions in the past six months. Much has been written about the…
A new kernel module rootkit malware was released recently on GitHub, dubbed Reptile. It’s an open-source rootkit that has the ability to hide itself, other…
According to recent reports, twelve government ministries in Norway have been targeted by cyber-attacks. The most recent attack was aimed at Norway’s public sector, and…
NuRR is a product that claims to intercept and capture the encryption keys at the start of a ransomware’s encryption process. With the keys caught,…