IT Priorities 2023: Cloud and disaster recovery top storage and backup plans
18
Apr
2023

IT Priorities 2023: Cloud and disaster recovery top storage and backup plans

Public cloud storage deployments are by far the biggest storage priority for organisations in the UK and Ireland in 2023,…

18
Apr
2023

Word bugs in software documentation and how to fix them

A collection of mistakes that make documentation less awesome than it could be. I’ve been an editor longer than I’ve…

Goldoson Android Malware
18
Apr
2023

Goldoson Android Malware Infects Over 100 Million Google Play Store Downloads

Apr 18, 2023Ravie LakshmananMobile Security / Hacking A new Android malware strain named Goldoson has been detected in the official…

Tech companies and NGOs urge rewrite of Online Safety Bill to protect encrypted comms
18
Apr
2023

Tech companies and NGOs urge rewrite of Online Safety Bill to protect encrypted comms

Technology companies offering encrypted messaging services have urged the government to make urgent changes to legislation going through Parliament that…

Used Routers Often Come Loaded With Corporate Secrets
18
Apr
2023

Used Routers Often Come Loaded With Corporate Secrets

Since secondhand equipment is discounted, it would potentially be feasible for cybercriminals to invest in purchasing used devices to mine…

Western Digital ransomware attack
18
Apr
2023

Hackers Ain’t Happy, Here’s Why

Western Digital Corporation, a leading American computer drive manufacturer and data storage company, is facing the wrath of the ALPHV…

Introducing DOM Invader: DOM XSS just got a whole lot easier to find | Blog
18
Apr
2023

Introducing DOM Invader: DOM XSS just got a whole lot easier to find | Blog

Gareth Heyes | 30 June 2021 at 16:47 UTC Of the three main types of XSS, DOM-based XSS is by…

Hacker Appreciation Month: Badge Awards
18
Apr
2023

Hacker Appreciation Month: Badge Awards

Celebrating the accomplishments of hackers is something we want to do year-round. However, we decided we wanted to root Cyber…

Why IAM systems are crucial for securing multicloud architecture
18
Apr
2023

Why IAM systems are crucial for securing multicloud architecture

Companies are finding themselves increasingly reliant on a growing number of cloud-based services, as business tools transform into online platforms,…

Gartner's top security threat and pentesting vs continuous scans - what you missed from Hack Yourself Stockholm 2021
18
Apr
2023

Gartner’s top security threat and pentesting vs continuous scans – what you missed from Hack Yourself Stockholm 2021

TL/DR: Detectify’s Hack Yourself event in Stockholm is 24 hours away, which means that it’s time to catch up on…

Malware found in James Webb Space Telescope revealed by US President Joe Biden
18
Apr
2023

Malware found in James Webb Space Telescope revealed by US President Joe Biden

Cybersecurity analysts from Securonix have discovered a new malware variant hiding in the images produced by the James Webb Space…

SimpleHelp Remote Support
18
Apr
2023

Iranian Hackers Using SimpleHelp Remote Support Software for Persistent Access

Apr 18, 2023Ravie LakshmananCyber Threat / Malware The Iranian threat actor known as MuddyWater is continuing its time-tested tradition of…