Cyclops Ransomware
06
Jun
2023

Cyclops Ransomware Gang Offers Go-Based Info Stealer to Cybercriminals

Jun 06, 2023Ravie LakshmananEndpoint Security / Data Security Threat actors associated with the Cyclops ransomware have been observed offering an…

Chinese PostalFurious Gang Strikes UAE Users with Sneaky SMS Phishing Scheme
06
Jun
2023

Chinese PostalFurious Gang Strikes UAE Users with Sneaky SMS Phishing Scheme

Jun 06, 2023Ravie Lakshmanan A Chinese-speaking phishing gang dubbed PostalFurious has been linked to a new SMS campaign that’s targeting…

TechUK publishes ‘UK tech plan’ for next government
06
Jun
2023

TechUK publishes ‘UK tech plan’ for next government

A comprehensive, forward-thinking strategy is needed from the UK government to fully realise the potential of technology to drive economic…

Hackers exploit Gmail Blue checkmark impacting 1.8 billion Google users
06
Jun
2023

Hackers exploit Gmail Blue checkmark impacting 1.8 billion Google users

Attention all business Gmail account holders, it is crucial to stay informed about the following news story. Security experts have…

ChatGPT Cybersecurity Grant Program - $1M
06
Jun
2023

ChatGPT Cybersecurity Grant Program – $1M

OpenAI, supported by Microsoft, recently unveiled an innovative cybersecurity grant initiative to enhance AI-driven cybersecurity measures. The creators of ChatGPT…

Preventing sophisticated phishing attacks aimed at employees
06
Jun
2023

Three ways agribusinesses can protect vital assets from cyberattacks

[ This article was originally published here ] The content of this post is solely the responsibility of the author. …

06
Jun
2023

Apple announces next-level privacy and security innovations

Apple announced its latest privacy and security innovations, including major updates to Safari Private Browsing, Communication Safety, and Lockdown Mode,…

Shell Scripts eCommerce Sites
06
Jun
2023

Hackers Inject Shell Scripts into eCommerce Sites

A recently discovered credit card theft operation, Magecart, has adopted an innovative approach by utilizing authentic websites as makeshift C2…

06
Jun
2023

Leveraging large language models (LLMs) for corporate security and privacy

“Once a new technology rolls over you, if you’re not part of the steamroller, you’re part of the road.” –…

Zyxel Firewalls
06
Jun
2023

Zyxel Firewalls Under Attack! Urgent Patching Required

Jun 06, 2023Ravie LakshmananNetwork Security / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday placed two recently…

Five key steps where there is a risk of fraud investigation
06
Jun
2023

Cyber spotlight falls on boardroom ‘privilege’ as incidents soar

Three-quarters of all data breaches observed in the past year included a significant element of human failure, with social engineering…

06
Jun
2023

CISOs focus more on business strategy than threat research

CISOs and ITDMs (IT security decision-makers) continue to be most occupied with business, IT and security program strategy, but they…