Free Download Manager
21
Sep
2023

Ukrainian Hacker Suspected to be Behind “Free Download Manager” Malware Attack

Sep 21, 2023THNSupply Chain / Malware The maintainers of Free Download Manager (FDM) have acknowledged a security incident dating back…

Snatch Ransomware Group Claims The FDVA Cyber Attack
21
Sep
2023

Company Refutes SeigedSec PeerBerry Data Breach Allegation

In a recent turn of events, PeerBerry, the prominent peer-to-peer lending platform, finds itself at the center of a storm…

SME Cyber Security – Time for a New Approach?
21
Sep
2023

SME Cyber Security – Time for a New Approach?

The UK is home to around 5.5 million Small and Medium-sized Enterprises (SMEs). They collectively account for 99.9% of businesses,…

21
Sep
2023

Critical Trend Micro vulnerability exploited in the wild (CVE-2023-41179)

Trend Micro has fixed a critical vulnerability (CVE-2023-41179) in several of its endpoint security products for enterprises that has been…

Magento Security Checklist
21
Sep
2023

A Magento Store Security Guide 2023

As one of the leading eCommerce platforms, Magento hosts many online businesses, each holding vast amounts of sensitive customer and…

Nagios Monitoring Tool Vulnerabilities
21
Sep
2023

T-Mobile App Glitch Exposes Other User’s Sensitive Data

The mobile application of T-Mobile has recently been a cause of concern among its customers due to issues concerning privacy….

Snatch Ransomware Group Claims The FDVA Cyber Attack
21
Sep
2023

Snatch Ransomware Group Claims The FDVA Cyber Attack

Snatch ransomware group targeted a government agency for veterans. The hackers posted about a cyber attack on the Florida Department…

Chinese Hackers use .chm Files to Hijack Execution Chain
21
Sep
2023

Chinese Hackers use .chm Files to Hijack Execution Chain

The Chinese state-backed group TAG-74 is known for conducting intelligence collection on organizations in the following countries:- The TAG-74 utilizes…

21
Sep
2023

Building GenAI competence for business growth

To embark on the GenAI technology adoption journey for business success, organizations require foundational activities related to GenAI investment, guidance…

T Mobile app customers experience data security concerns
21
Sep
2023

T Mobile app customers experience data security concerns

Users of the T-Mobile App have recently encountered an unsettling phenomenon, with their account information displaying the personal data of…

21
Sep
2023

Regulatory pressure complicates cybersecurity for industrial equipment manufacturers

50% of companies lack a dedicated security function for control systems and devices within their organizational structure, according to Cybellum….

WinRAR Vulnerability
21
Sep
2023

Fake Exploit for WinRAR Vulnerability on GitHub Infects Users with VenomRAT

Sep 21, 2023THNVulnerability / Exploit A malicious actor released a fake proof-of-concept (PoC) exploit for a recently disclosed WinRAR vulnerability…