Poison Ivy APT Launches Continuous Cyber Attack on Defense, Gov, Tech & Edu Sectors
02
Dec
2024

Poison Ivy APT Launches Continuous Cyber Attack on Defense, Gov, Tech & Edu Sectors

Researchers uncovered the resurgence of APT-C-01, also known as the Poison Ivy group, an advanced persistent threat organization notorious for…

How threat actors can use generative artificial intelligence?
02
Dec
2024

How threat actors can use generative artificial intelligence?

How threat actors can use generative artificial intelligence? Pierluigi Paganini December 02, 2024 Generative Artificial Intelligence (GAI) is rapidly revolutionizing…

Telstra swallows prepaid mobile provider Boost for $100m
02
Dec
2024

Telstra swallows prepaid mobile provider Boost for $100m – Telco/ISP

Telstra is to acquire mobile virtual network operator Boost Mobile, expanding its existing operational management of the company. Boost Mobile…

Why Simulating Phishing Attacks Is the Best Way to Train Employees
01
Dec
2024

Why Simulating Phishing Attacks Is the Best Way to Train Employees

Despite advancements in cybersecurity tools, human vulnerability remains the weakest link, with phishing among the most dangerous forms of social…

Weekly Cybersecurity Newsletter
01
Dec
2024

Vulnerabilities, Attack & Threat News

Welcome to this week’s Cybersecurity Newsletter, where we delve into the latest advancements and critical updates in the cybersecurity landscape….

The Importance of Data Anonymization In Safeguarding Sensitive Legal Information
01
Dec
2024

The Importance of Data Anonymization In Safeguarding Sensitive Legal Information

Several high-profile and global law firms have been under the radar of cyber-security data breaches. For instance, the Mossack Fonseca…

Rockstar 2FA
01
Dec
2024

Phishing-as-a-Service Attack Microsoft 365 Accounts Via AiTM Attacks

Cybersecurity researchers have identified a concerning link between the advanced phishing toolkit known as ‘Rockstar 2FA’ and a surge in…

Week in review: Exploitable flaws in corporate VPN clients, malware loader created with gaming engine
01
Dec
2024

Week in review: Exploitable flaws in corporate VPN clients, malware loader created with gaming engine

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Researchers reveal exploitable flaws in…

Ransomware Developer Mikhail Matveev Arrested in Russia
01
Dec
2024

Ransomware Developer Mikhail Matveev Arrested in Russia

Russian authorities have arrested Mikhail Matveev, a notorious Russian hacker linked to multiple ransomware attacks worldwide. Matveev, who was also…

Microsoft to Deprecate Bring Your Own License Defender Feature for Cloud
01
Dec
2024

Microsoft to Deprecate Bring Your Own License Defender Feature for Cloud

Microsoft has announced plans to deprecate the “Bring Your Own License” (BYOL) feature in Microsoft Defender for Cloud as part…

Hackers stole millions of dollars from Uganda Central Bank
01
Dec
2024

Hackers stole millions of dollars from Uganda Central Bank

Hackers stole millions of dollars from Uganda Central Bank Pierluigi Paganini December 01, 2024 Financially-motivated threat actors hacked Uganda ‘s…

TasWater restructures tech delivery amid transformation program
01
Dec
2024

TasWater restructures tech delivery amid transformation program – Cloud – Hardware – Networking – Software

TasWater is to undergo a major technology transformation program with a focus on replacing and uplifting its core IT system….