Dating Apps And Sites: Mitigating Chargebacks In 2023
04
Aug
2023

Delta Electronics Data Breach Claimed By NDT SEC Group

In what appears to be a targeted cyber attack, the NDT SEC hacking group has reportedly aimed at Delta Electronics’…

Attackers use dynamic code loading to bypass Google Play store's malware detectionsSecurity Affairs
04
Aug
2023

Attackers use dynamic code loading to bypass Google Play store’s malware detectionsSecurity Affairs

Threat actors rely on the ‘versioning’ technique to evade malware detections of malicious code uploaded to the Google Play Store….

CyberSmart makes waves in SME cybersecurity market
04
Aug
2023

Economic uncertainty leaves over 1 mil UK SMEs at brink of collapse

Over the past couple of years, the cost of living in the UK has increased significantly. The annual rate of…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
04
Aug
2023

Exploitation of Ivanti EPMM Flaw Picking Up as New Vulnerability Is Disclosed

Exploitation of the recently disclosed Ivanti Endpoint Manager Mobile (EPMM) vulnerability has started to pick up, just as the vendor…

Bad Hygiene: New Study Uncovers Common Security Failures of Cloud-First Organizations
04
Aug
2023

Bad Hygiene: New Study Uncovers Common Security Failures of Cloud-First Organizations

By Ruoting Sun, Vice President of Products, Secureframe The rapid rise of cloud-first organizations has revolutionized the way businesses operate….

04
Aug
2023

August 2023 Patch Tuesday forecast: Software security improvements

The continued onslaught of phishing attacks, ransomware deployment, and other exploitation is forcing the community to pay closer attention to…

Biden’s SBOM mandate a ‘shot heard around the world’, report says
04
Aug
2023

Biden’s SBOM mandate a ‘shot heard around the world’, report says

Two and a quarter years after President Biden signed an Executive Order (EO) to harden the US’ cyber security defences…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
04
Aug
2023

Five Eyes Agencies Call Attention to Most Frequently Exploited Vulnerabilities

Government agencies in Australia, Canada, New Zealand, the UK, and the US have published a list of the software vulnerabilities…

HEAT Attacks Vs Apts – What Is the Difference?
04
Aug
2023

HEAT Attacks Vs Apts – What Is the Difference?

By Mark Guntrip, Senior Director of Cybersecurity Strategy, Menlo Security A new breed of attacker has emerged, one that has…

BEC Attacks
04
Aug
2023

What is BEC Attacks (Business Email Compromise)?

BEC, an acronym for Business Email Compromise, is a sophisticated form of cybercrime. Cyber threats have become a pressing concern…

Cyble Detects STRRAT Version 1.6 Using Dual String Obfuscation Techniques
04
Aug
2023

Cyble Detects STRRAT Version 1.6 Using Dual String Obfuscation Techniques

The hackers behind STRRAT have adopted a new infection technique to distribute its latest version, 1.6, as highlighted by Cyble…

Dating Apps And Sites: Mitigating Chargebacks In 2023
04
Aug
2023

Patient Care Delayed After ECHN Ransomware Attack

The parent company of Eastern Connecticut Health Network and Waterbury HEALTH, Prospect Medical Holdings, announced that all its facilities were…