Melbourne Airport aims to ‘predict the future’ with enhanced cyber visibility
27
Apr
2025

Melbourne Airport aims to ‘predict the future’ with enhanced cyber visibility

Melbourne Airport is building up its cyber detection and response capabilities in order to secure 30 million annual passenger journeys,…

DragonForce forms ransomware cartel with multiple RaaS affiliates
27
Apr
2025

DragonForce expands ransomware model with white-label branding scheme

The ransomware scene is re-organizing, with one gang known as DragonForce working to gather other operations under a cartel-like structure….

Brave
27
Apr
2025

Brave’s Cookiecrumbler tool taps community to help block cookie notices

Brave has open-sourceed a new tool called “Cookiecrumbler,” which uses large language models (LLMs) to detect cookie consent notices and…

Coinbase
27
Apr
2025

Coinbase fixes 2FA log error making people think they were hacked

Coinbase has fixed a confusing bug in its account activity logs that caused users to think their credentials were compromised….

Key Cybersecurity Considerations for 2025
27
Apr
2025

Key Cybersecurity Considerations for 2025

As we usher in a new year, it’s crucial to focus on key areas in cybersecurity that demand our attention….

NoSQL Injection: Advanced Exploitation Guide
27
Apr
2025

NoSQL Injection: Advanced Exploitation Guide

NoSQL injections are relatively easier to exploit than classic SQL injections. However, developers often overlook these vulnerabilities, mainly due to…

Storm-1977 targets education sector with password spraying
27
Apr
2025

Storm-1977 targets education sector with password spraying

Storm-1977 targets education sector with password spraying, Microsoft warns Pierluigi Paganini April 27, 2025 Microsoft warns that threat actor Storm-1977…

Make the Most of Your Holiday Cybersecurity Awareness Efforts
27
Apr
2025

Make the Most of Your Holiday Cybersecurity Awareness Efforts

The holiday season is a time for joy, celebration, and, unfortunately, an uptick in cyber threats. From phishing scams that…

What’s Right For Your Penetration Testing Team?
27
Apr
2025

What’s Right For Your Penetration Testing Team?

In the ever-changing world of cybersecurity, organizations are constantly challenged to choose the right security operations model that best supports…

Identity and Access Management (IAM)
27
Apr
2025

Identity and Access Management (IAM)

In an era where digital identities have become the primary attack vector, CISOs face unprecedented pressure to secure access across…

IXON VPN Vulnerabilities Let Attackers Gain Access to Windows & Linux Systems
27
Apr
2025

IXON VPN Vulnerabilities Let Attackers Gain Access to Windows & Linux Systems

A recent security assessment by Shelltrail has uncovered three critical vulnerabilities in the IXON VPN client, potentially allowing attackers to…

Navigating Cybersecurity Frameworks - CISO Resource Guide
27
Apr
2025

Navigating Cybersecurity Frameworks – CISO Resource Guide

The role of the Chief Information Security Officer (CISO) has never been more critical. As organizations face a rapidly evolving…