MailChimp Security Breach
19
Jan
2023

Rivals Use MailChimp Security Breach to Leverage Products

Ever since the MailChimp security breach on January 11, which led to the unidentified threat actors accessing one of its…

19
Jan
2023

Home Affairs targets cyber security uplift with ‘Project Eight’ – Security

Home Affairs has set up a dedicated taskforce within its ICT division to assess its cyber security maturity against the…

Microsoft works with partners on Cybercrime Atlas
19
Jan
2023

Microsoft works with partners on Cybercrime Atlas

Microsoft, in association with Fortinet and other partners, is working on mapping cyber crime activities and attain responses to cyber…

19
Jan
2023

Cyber insurance can offset the risks of potential breaches

SMBs are aware of increasing cyber threats and allocating resources and investing in areas such as network and cloud security,…

Accountant ordered to pay ex-employer after bossware shows "time theft"
19
Jan
2023

Accountant ordered to pay ex-employer after bossware shows “time theft”

Bossware helped an employer fire an accountant for not working during work time. The accountant sued for wrongful termination. The…

19
Jan
2023

Genesis Day Claims Responsibility For Samsung Cyber Attack

Hacktivist outfit Genesis Day has claimed to attack South Korean technology giant Samsung and has allegedly accessed its internal systems. …

19
Jan
2023

NAB pushes forward with stablecoin ambitions – Strategy

NAB will soon begin testing its own stablecoin, AUDN, about a year after it first unveiled plans for the currency….

Hackers push malware via Google search ads for VLC, 7-Zip, CCleaner
19
Jan
2023

Hackers push malware via Google search ads for VLC, 7-Zip, CCleaner

Hackers are setting up fake websites for popular free and open-source software to promote malicious downloads through advertisements in Google…

A Brief Process Of Create a Cyber Security Infrastructure
19
Jan
2023

A Brief Process Of Create a Cyber Security Infrastructure

In earlier years, everyone depends on SOC (including firewalls, WAF, SIEM,etc.) and the priority in building the SOC provides security…

CloudSEK offers a search engine to detect malicious apps
19
Jan
2023

CloudSEK offers a search engine to detect malicious apps

CloudSEK has developed a new app called BeVigil that can help search malicious apps downloaded on a mobile phone and…

19
Jan
2023

Techniques that attackers use to trick victims into visiting malicious content

Businesses widely use cloud applications, a fact not lost on attackers, which view these apps as an ideal home for…

TikTok dances to the tune of $5.4m cookie fine
19
Jan
2023

TikTok dances to the tune of $5.4m cookie fine

We take a look at the latest fine hitting a social media network, this time over the issue of cookie…