What Does it Take to be a Full-Fledged Virtual CISO?
May 03, 2023The Hacker NewsCISO / Cybersecurity Almost half of MSP clients fell victim to a cyberattack within the last 12 months. In the SMB…
May 03, 2023The Hacker NewsCISO / Cybersecurity Almost half of MSP clients fell victim to a cyberattack within the last 12 months. In the SMB…
May 03, 2023Ravie LakshmananPrivacy / Technology Apple and Google have teamed up to work on a draft industry-wide specification that’s designed to tackle safety risks…
May 03, 2023Ravie LakshmananSurveillance / Vulnerability Threat actors are actively exploiting an unpatched five-year-old flaw impacting TBK digital video recording (DVR) devices, according to an…
May 03, 2023Ravie LakshmananICS/SCADA Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday released an Industrial Control Systems (ICS) advisory about a critical…
May 02, 2023Ravie LakshmananNetwork Security / Vulnerability Cybersecurity researchers have uncovered weaknesses in a software implementation of the Border Gateway Protocol (BGP) that could be…
The telecom industry has always been a tantalizing target for cybercriminals. The combination of interconnected networks, customer data, and sensitive information allows cybercriminals to inflict…
May 02, 2023Ravie LakshmananMobile Security / Spyware A new Android surveillanceware possibly used by the Iranian government has been used to spy on over 300…
May 02, 2023Ravie LakshmananThreat Intelligence The North Korean threat actor known as ScarCruft began experimenting with oversized LNK files as a delivery route for RokRAT…
May 02, 2023Ravie LakshmananMalvertising / Cyber Threat In yet another instance of how threat actors are abusing Google Ads to serve malware, a threat actor…
May 02, 2023Ravie LakshmananVulnerability / Cyber Threat The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three flaws to the Known Exploited Vulnerabilities (KEV)…
May 01, 2023Ravie Lakshmanan An analysis of over 70 billion DNS records has led to the discovery of a new sophisticated malware toolkit dubbed Decoy…
May 01, 2023The Hacker NewsCyber Threat / Authentication Just a few short years ago, lateral movement was a tactic confined to top APT cybercrime organizations…