The AT&T Phone Records Stolen
08
Nov
2024

The AT&T Phone Records Stolen

In today’s digital age, the importance of cybersecurity must be re-balanced. With increasing cyberattacks and data breaches, organizations must prioritize…

Apple’s 45-day certificate proposal: A call to action
08
Nov
2024

Apple’s 45-day certificate proposal: A call to action

In a bold move, Apple has published a draft ballot for commentary to GitHub to shorten Transport Layer Security (TLS)…

Cloud-Based Tools
08
Nov
2024

IcePeony and Transparent Tribe Target Indian Entities with Cloud-Based Tools

Nov 08, 2024Ravie LakshmananCyber Espionage / Threat Intelligence High-profile entities in India have become the target of malicious campaigns orchestrated…

Government announces Green Paper on future of scandal-ridden Post Office
08
Nov
2024

Government announces Green Paper on future of scandal-ridden Post Office

The government is to publish a Green Paper to gather information to help decide the Post Office’s future following the…

Newpark Resources Contends With Ransomware
08
Nov
2024

Newpark Resources Contends With Ransomware

Newpark Resources, a key supplier to the oilfield industry has disclosed that it fell victim to a ransomware attack that…

The cyber threat landscape part 1: Enhancing cybersecurity strategies
08
Nov
2024

The cyber threat landscape part 1: Enhancing cybersecurity strategies

The world continues to witness a dramatic transformation in the cybersecurity landscape. The demand for effective, global threat intelligence intensifies…

Unpatched Mazda Connect bugs let hackers install persistent malware
08
Nov
2024

Unpatched Mazda Connect bugs let hackers install persistent malware

Attackers could exploit several vulnerabilities in the Mazda Connect infotainment unit, present in multiple car models including Mazda 3 (2014-2021),…

Beware of Fake Copyright Claims That Deliver Rhadamanthys Stealer
08
Nov
2024

Beware of Fake Copyright Claims That Deliver Rhadamanthys Stealer

Stealer malware is a type of malicious software designed to infiltrate computers and extract sensitive information. Once installed, it communicates…

How to maximize cybersecurity ROI
08
Nov
2024

How to maximize cybersecurity ROI

Cost savings and business benefits were quantified in “The Total Economic Impact of Cynet All-in-One Security,” a commissioned study conducted…

Innovator Spotlight: Push Security
08
Nov
2024

Innovator Spotlight: Push Security – Cyber Defense Magazine

Identity is the new perimeter. Attackers are no longer hacking into your organization—they’re logging in with compromised credentials. Push Security…

Mazda’s infotainment system vulnerabilities
08
Nov
2024

Hackers Can Access Mazda Vehicle Controls Via System Vulnerabilities

Hackers can exploit critical vulnerabilities in Mazda’s infotainment system, including one that enables code execution via USB, compromising your car’s…

Naveen Goud
08
Nov
2024

American Oilfield supplier Newpark Resources hit by ransomware attack

Newpark Resources, a Texas-based company providing essential tools and services to the oil and gas industry, as well as the…