Norwegian Refugee Council leverages Okta for Good cyber scheme
30
Aug
2024

Norwegian Refugee Council leverages Okta for Good cyber scheme

Following a series of high-profile data breaches that originated via its tech, identity and access management (IAM) technology supplier Okta…

South Korea-linked group APT-C-60 exploited a WPS Office zero-day
30
Aug
2024

South Korea-linked group APT-C-60 exploited a WPS Office zero-day

South Korea-linked group APT-C-60 exploited a WPS Office zero-day Pierluigi Paganini August 30, 2024 South Korea-linked group APT-C-60 exploited a…

Hackerone logo
30
Aug
2024

Pentesting for iOS Mobile Applications

Pentest reports are a requirement for many security compliance certifications (such as GDPR and HIPAA), and having regular pentest reports on hand can…

#FreeDurov – Hacktivists Rally On Telegram For Pavel’s Release
30
Aug
2024

Hacktivists Rally On Telegram For Pavel’s Release

The events surrounding Pavel Durov’s arrest on 24 August 2024 due to Telegram’s suspected operational crimes worsened discussions on topics…

Iranian Threat Group Attack US Organization Via Ransomware
30
Aug
2024

Iranian Threat Group Attack US Organization Via Ransomware

Iranian cyber actors have been identified as the perpetrators behind ransomware attacks targeting U.S. organizations across multiple sectors. This revelation…

Year-Long Malware Campaign Exploits NPM to Attack Roblox Developers
30
Aug
2024

Year-Long Malware Campaign Exploits NPM to Attack Roblox Developers

A year-long malware campaign targets Roblox developers using fake NPM packages mimicking “noblox.js” to steal data. Despite takedowns, new threats…

cybernewswire
30
Aug
2024

INE Security Named 2024 SC Awards Finalist

Cary, North Carolina, August 30th, 2024, CyberNewsWire INE Security is pleased to announce that it has been recognized as a…

Iranian Hackers Set Up New Network to Target U.S. Political Campaigns
30
Aug
2024

Iranian Hackers Set Up New Network to Target U.S. Political Campaigns

Aug 30, 2024Ravie LakshmananCyber Threat / Cyber Espionage Cybersecurity researchers have unearthed new network infrastructure set up by Iranian threat…

How To Protect Yourself After Data Breach
30
Aug
2024

How To Protect Yourself After Data Breach

Fota Wildlife Park, one of Ireland’s premier wildlife attractions, has fallen victim to a cyberattack that has potentially compromised the…

Durex India Data Breach
30
Aug
2024

Durex India Data Breach Allegedly Exposes Customer Data

Durex India, the local arm of the popular British condom and personal lubricants brand, has reportedly suffered a significant cyberattack…

30
Aug
2024

Why maintaining older hardware is the smart economic decision – Partner Content – Hardware

While the cloud has been the destination of choice for many, there are plenty of good reasons why organisations can’t…

Threat actors exploit Atlassian Confluence bug in cryptomining campaigns
30
Aug
2024

Threat actors exploit Atlassian Confluence bug in cryptomining campaigns

Threat actors exploit Atlassian Confluence bug in cryptomining campaigns Pierluigi Paganini August 30, 2024 Threat actors are actively exploiting a…