Massive Midnight Blizzard Phishing Attack Via Weaponized RDP Files
30
Oct
2024

Massive Midnight Blizzard Phishing Attack Via Weaponized RDP Files

Threat actors impersonate trusted entities to deceive individuals into revealing sensitive information in phishing attacks. Phishing attacks are executed via…

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics
30
Oct
2024

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on organizations using sophisticated spear-phishing tactics. Known…

Naveen Goud
30
Oct
2024

US Elections 2024 are super prone to cyber attacks

With only a week remaining until the 2024 U.S. elections, global attention is squarely on America, a nation known for…

Jane Devry
30
Oct
2024

The Hidden Threat of Web Scraping and How to Fight Back

Today’s organizations face a daunting challenge: effectively and at scale detecting and preventing web scraping attacks. These attacks, which involve…

US Government Issues New Traffic Light Protocol Guidelines
30
Oct
2024

US Government Issues New Traffic Light Protocol Guidelines

The U.S. government (USG) has revealed new guidelines regarding the Traffic Light Protocol (TLP). This framework is essential for managing…

AI
30
Oct
2024

CEO Sundar Pichai Unveils Google’s Next AI Moves, But Can Users and Enterprises Keep Up?

In its Q3 2024 earnings call, Google and Alphabet CEO Sundar Pichai highlighted a strong quarter for Alphabet, with growth…

Google Chrome Security, Critical Vulnerabilities Patched
30
Oct
2024

Google Chrome Security, Critical Vulnerabilities Patched

Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions of users worldwide. The latest…

Naveen Goud
30
Oct
2024

What to Do If Hit by Ransomware

Ransomware attacks are increasingly common, and falling victim to one can be a terrifying experience. If you find yourself in…

Simplifying decentralized identity systems for everyday use
30
Oct
2024

Simplifying decentralized identity systems for everyday use

In this Help Net Security interview, Carla Roncato, VP of Identity at WatchGuard Technologies, discusses how companies can balance privacy,…

CISA Aims For Cyber Resilience
30
Oct
2024

CISA Aims For Cyber Resilience

The Cybersecurity and Infrastructure Security Agency (CISA) has launched its first-ever International Strategic Plan for 2025-2026, marking a significant step…

Risk hunting: A proactive approach to cyber threats
30
Oct
2024

Risk hunting: A proactive approach to cyber threats

Cybersecurity is an overly reactive industry. Too often we act like firefighters, rushing from blaze to blaze, extinguishing flames hoping…

ANZ to set up group-wide data and analytics function, CDAO role
30
Oct
2024

ANZ to set up group-wide data and analytics function, CDAO role – Financial Services – Software

ANZ Banking Group is setting up a group-wide data and analytics function and appointing a new C-level executive to run…