Lock
04
Sep
2024

New Eucleak attack lets threat actors clone YubiKey FIDO keys

A new “EUCLEAK” flaw found in FIDO devices using the Infineon SLE78 security microcontroller, like Yubico’s YubiKey 5 Series, allows attackers…

DDoS Attacks Hit France Over Telegram's Pavel Durov Arrest
04
Sep
2024

DDoS Attacks Hit France Over Telegram’s Pavel Durov Arrest

Hacktivists unite for the #FreeDurov campaign to launch a massive cyber campaign against France in response to Telegram CEO Pavel…

Jane Devry
04
Sep
2024

Adapting Cybersecurity Practices to Modern Threats

As technology evolves, so do the associated threats, making cybersecurity an essential priority for both individuals and organizations. Traditional security…

A young man sat down with his head in one hand and holding a phone in the other.
04
Sep
2024

“Hello pervert” sextortion scam includes new threat of Pegasus—and a picture of your home

After using passwords obtained from one of the countless breaches as a lure to trick victims into paying, the “Hello…

North Korean Hackers Targets Job Seekers with Fake FreeConference App
04
Sep
2024

North Korean Hackers Targets Job Seekers with Fake FreeConference App

North Korean threat actors have leveraged a fake Windows video conferencing application impersonating FreeConference.com to backdoor developer systems as part…

Cloud repatriation: How to do it successfully
04
Sep
2024

Cloud repatriation: How to do it successfully

Cloud repatriation – sometimes called “reverse migration” – is something any organisation that uses cloud storage should consider. It’s the…

Head Mare hacktivist group targets Russia and Belarus
04
Sep
2024

Head Mare hacktivist group targets Russia and Belarus

Head Mare hacktivist group targets Russia and Belarus Pierluigi Paganini September 04, 2024 A group of hacktivist known as Head Mare took…

Hackers inject malicious JS in Cisco store to steal credit cards, credentials
04
Sep
2024

Hackers inject malicious JS in Cisco store to steal credit cards, credentials

Cisco’s site for selling company-themed merchandise is currently offline and under maintenance due to hackers compromising it with JavaScript code…

Aembit Named Finalist in Best Identity Management Solution for 2024 SC Awards
04
Sep
2024

Aembit Named Finalist in Best Identity Management Solution for 2024 SC Awards

The Company’s Workload IAM Platform Was Also Shortlisted for Best Authentication Technology, as Non-Human Identity Security Gains Urgency Aembit, the…

Jane Devry
04
Sep
2024

Comprehensive Threat Protection Strategies for Google Workspace Environments

The cloud is where many of the daily jobs that businesses do are done. It’s more important than ever to…

2024 election
04
Sep
2024

How to avoid election related scams

With the US election campaigns at full throttle, scammers have taken a renewed interest in the ways this can be…

Lloyds Bank uses artificial intelligence to check trade finance documents
04
Sep
2024

Lloyds Bank uses artificial intelligence to check trade finance documents

Lloyds Bank is streamlining its trade financing sales through the use of artificial intelligence (AI), which will automate the checking…