EvilProxy Phishing Kit Targets Microsoft Users via Indeed.com Vulnerability
04
Oct
2023

EvilProxy Phishing Kit Targets Microsoft Users via Indeed.com Vulnerability

Threat actors are exploiting the open redirection vulnerability on Indeed.com to launch EvilProxy phishing attacks against high-ranking executives. The cybersecurity…

Google to combine generative AI chatbot with virtual assistant
04
Oct
2023

Google to combine generative AI chatbot with virtual assistant – Software

Google has announced plans to add generative artificial intelligence (AI) capabilities to its virtual assistant. A company executive told Reuters…

Researchers warn of 100,000 industrial control systems exposed online
04
Oct
2023

Researchers warn of 100,000 industrial control systems exposed online

About 100,000 industrial control systems (ICS) were found on the public web, exposed to attackers probing them for vulnerabilities and…

New iOS exploit blamed on US intelligence
04
Oct
2023

Apple Warns of Newly Exploited iOS 17 Kernel Zero-Day

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down. The Cupertino…

Atlassian
04
Oct
2023

Atlassian patches critical Confluence zero-day exploited in attacks

Australian software company Atlassian released emergency security updates to fix a maximum severity zero-day vulnerability in its Confluence Data Center…

Apple
04
Oct
2023

Apple emergency update fixes new zero-day used to hack iPhones

Apple released emergency security updates to patch a new zero-day security flaw exploited in attacks targeting iPhone and iPad users. “Apple…

Stream-Jacking: Malicious YouTube Livestreams Aid Malware, Crypto Scams
04
Oct
2023

Malicious YouTube Livestreams Aid Malware, Crypto Scams

Researchers observed that Tesla was the most targeted brand in the Stream-Jacking campaign, and these scams continue to increase on…

Why Are CISOs Struggling with Governance, Risk, and Compliance Reporting?
04
Oct
2023

Why Are CISOs Struggling with Governance, Risk, and Compliance Reporting?

By Sravish Sridhar, CEO & Founder, TrustCloud In our increasingly digitally connected world, cybersecurity risks are at an all time…

Bug bounty DIY: The pros and cons of managing vulnerability disclosure in-house 
04
Oct
2023

Bug bounty DIY: The pros and cons of managing vulnerability disclosure in-house 

So you’ve decided that your business or organization should launch a bug bounty program, a great first step in taking…

04
Oct
2023

Backdoored Android phones, TVs used for ad fraud – and worse!

A key monetization mechanism of a sophisticated series of cybercriminal operations involving backdoored off-brand mobile and CTV Android devices has…

Zero Day Attack
04
Oct
2023

Atlassian Ships Urgent Patch for Exploited Confluence Zero-Day

Business software maker Atlassian on Wednesday called immediate attention to a major security defect in its Confluence Data Center and…

Cisco
04
Oct
2023

Cisco fixes hard-coded root credentials in Emergency Responder

Cisco released security updates to fix a Cisco Emergency Responder (CER) vulnerability that let attackers log into unpatched systems using…