New macOS Malware “Cthulhu Stealer” Targets Apple Users’ Data
Aug 23, 2024Ravie LakshmananEndpoint Security / Data Privacy Cybersecurity researchers have uncovered a new information stealer that’s designed to target...
Read more →Aug 23, 2024Ravie LakshmananEndpoint Security / Data Privacy Cybersecurity researchers have uncovered a new information stealer that’s designed to target...
Read more →To date, most technology solutions focused on vulnerability management have focused on the prioritization of risks. That usually took the...
Read more →INE Security, a global cybersecurity training and certification provider, recently launched initiatives with several higher education institutions in an ongoing...
Read more →In the first six months of 2024, Hiya flagged nearly 20 billion calls as suspected spam – more than 107...
Read more →A sophisticated China-linked cyber espionage group, known as Velvet Ant, has been discovered exploiting a zero-day vulnerability in Cisco NX-OS...
Read more →Despite the increasing number of cybersecurity tools available, attacks continue to succeed at an alarming rate. Studies show that more...
Read more →Vulnerability management has become more critical than ever as the global cost of cybercrime is projected to reach $10.5 trillion...
Read more →As security and identity management become increasingly more complex with 60% of breaches attributed to insider threats, compromising on access...
Read more →Here’s a look at the most interesting products from the past week, featuring releases from Entrust, Fortanix, McAfee, Own, RightCrowd,...
Read more →On August 21, 2024, McDonald’s official Instagram account was hacked, resulting in a cryptocurrency scam that made the hackers around...
Read more →Cisco has raised concerns about the recently adopted UN Convention Against Cybercrime, questioning its effectiveness in bringing about stricter international...
Read more →A sophisticated Slack malvertising campaign targeting users has been found exploiting Google search ads to deliver malware. This stealthy attack...
Read more →