7 Steps International Organizations Must Take to Defend Critical National Infrastructure
20
Jan
2025

7 Steps International Organizations Must Take to Defend Critical National Infrastructure

Critical national infrastructure (CNI) is at risk in countries across the globe. When attackers target CNI systems—which include power plants,…

surveillance pricing
20
Jan
2025

Your location or browsing habits could lead to price increases when buying online

Companies are showing customers different prices for the same goods and services based what data they have on them, including…

Hackers Weaponize MSI Packages & PNG Files to Deliver Multi-stage Malware
20
Jan
2025

Hackers Weaponize MSI Packages & PNG Files to Deliver Multi-stage Malware

Researchers have reported a series of sophisticated cyber attacks aimed at organizations in Chinese-speaking regions, including Hong Kong, Taiwan, and…

Government plans to revamp digital services to save £45bn
20
Jan
2025

Government plans to revamp digital services to save £45bn

The government is pushing the idea of using more digital tools and artificial intelligence (AI) to improve the efficiency of…

New IoT Botnet Launches large-scale DDoS attacks Hijacking IoT Devices
20
Jan
2025

New IoT Botnet Launches large-scale DDoS attacks Hijacking IoT Devices

Large-scale DDoS attack commands sent from an IoT botnet’s C&C server targeting Japan and other countries since late 2024. These…

Digital Identity Wallets Are Key To Building A Safer Online Future
20
Jan
2025

Digital Identity Wallets Are Key To Building A Safer Online Future

Cybercrime is draining resources from businesses and governments worldwide, and it is expected to cost the world $10.5 trillion annually by…

HTTP 1.1 Vs. HTTP 2: What Are the Differences?
20
Jan
2025

HTTP 1.1 Vs. HTTP 2: What Are the Differences?

According to this recent report by McKinsey, 87% of consumers say they won’t do business with your company if they have concerns…

Researchers Used ChatGPT to Discover S3 Bucket Takeover Vulnerability in Red Bull
20
Jan
2025

Researchers Used ChatGPT to Discover S3 Bucket Takeover Vulnerability in Red Bull

Bug bounty programs have emerged as a critical avenue for researchers to identify vulnerabilities in digital platforms. One such success…

Telehouse research highlights UK knowledge gap about what datacentres do
20
Jan
2025

Telehouse research highlights UK knowledge gap about what datacentres do

Despite the government repeatedly hyping up the importance of the datacentre market to the UK economy, research shows the general…

Malicious npm and PyPI target Solana Private keys to steal funds from victims' wallets
20
Jan
2025

Malicious npm and PyPI target Solana Private keys to steal funds from victims’ wallets

Malicious npm and PyPI target Solana Private keys to steal funds from victims’ wallets Pierluigi Paganini January 20, 2025 Researchers…

Sliver Implant Attacking German Entities With Weaponized LNK Files
20
Jan
2025

Sliver Implant Attacking German Entities With Weaponized LNK Files

A sophisticated cyberattack campaign targeting German organizations has been uncovered, utilizing weaponized LNK files to deploy the Sliver implant. The…

Threat Actor IntelBroker Allegedly Claiming Breach of Hewlett Packard Enterprise Data
20
Jan
2025

Threat Actor IntelBroker Allegedly Claiming Breach of Hewlett Packard Enterprise Data

A threat actor known as IntelBroker has taken to a prominent dark web forum to claim a significant data breach…