AWS, Azure auth keys found in Android and iOS apps used by millions
22
Oct
2024

AWS, Azure auth keys found in Android and iOS apps used by millions

Multiple popular mobile applications for iOS and Android come with hardcoded, unencrypted credentials for cloud services like Amazon Web Services (AWS)…

ACCC uplifts its cyber security posture
22
Oct
2024

ACCC uplifts its cyber security posture – Security

The Australian Competition and Consumer Commission (ACCC) is ramping up its cyber security capabilities over the rest of FY25. The…

SEC
22
Oct
2024

SEC charges tech companies for downplaying SolarWinds breaches

The SEC has charged four companies—Unisys Corp, Avaya Holdings, Check Point Software, and Mimecast—for allegedly misleading investors about the impact…

Fake CAPTCHA Pages Used by Lumma Stealer to Spread Fileless Malware
22
Oct
2024

Fake CAPTCHA Pages Used by Lumma Stealer to Spread Fileless Malware

Lumma Stealer malware uses fake CAPTCHA to deceive victims. This information-stealing malware targets sensitive data like passwords and cryptocurrency details….

Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans
22
Oct
2024

Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans

Russian-speaking users have become the target of a new phishing campaign that leverages an open-source phishing toolkit called Gophish to…

ERP horror stories and how to get back on track
22
Oct
2024

ERP horror stories and how to get back on track

Why do organisations invest in Enterprise Resource Planning (ERP) systems? The goal is simple: to make their business more efficient,…

CFPB Finalizes Personal Financial Data Rights Rule
22
Oct
2024

CFPB Finalizes Personal Financial Data Rights Rule

Regulators are betting big on data rights for reshaping financial services, starting with new rules aimed at giving consumers greater…

Exploit released for new Windows Server "WinReg" NTLM Relay attack
22
Oct
2024

Exploit released for new Windows Server “WinReg” NTLM Relay attack

Proof-of-concept exploit code is now public for a vulnerability in Microsoft’s Remote Registry client that could be used to take control of…

Exposed United Nations Database Left Sensitive Information Accessible Online
22
Oct
2024

Exposed United Nations Database Left Sensitive Information Accessible Online

A database containing sensitive, sometimes personal information from the United Nations Trust Fund to End Violence Against Women was openly…

Becoming a CIO: Eight tech roles to take you to the top
22
Oct
2024

Becoming a CIO: Eight tech roles to take you to the top

peshkova – stock.adobe.com By Helen Fleming, Executive Director – Search & Specialisms, Harvey Nash Published: 22 Oct 2024  A Chief…

INE Security Launches New Training Solutions to Enhance Cyber Hygiene for SMBs
22
Oct
2024

INE Security Launches New Training Solutions to Enhance Cyber Hygiene for SMBs

INE Security offers essential advice to protect digital assets and enhance security. As small businesses increasingly depend on digital technologies…

Dark Web Anti-Bot Services Let Phishers Bypass Google’s Red Page
22
Oct
2024

Dark Web Anti-Bot Services Let Phishers Bypass Google’s Red Page

Anti-bot services on the dark web allow phishers to bypass Google’s Red Page warnings, evading detection and making phishing campaigns…