CISA
25
Sep
2024

Hackers target industrial systems using “unsophisticated methods”

​CISA warned today of threat actors trying to breach critical infrastructure networks by targeting Internet-exposed industrial devices using “unsophisticated” methods…

Safe Browsing
25
Sep
2024

A Tool to Analyse Any Suspicious Links in Safe Virtual Browser

Safebrowsing utilizes a cloud-based virtual browser environment to analyze potentially risky websites. This isolated environment protects the local system from…

Timeshare Owner? The Mexican Drug Cartels Want You – Krebs on Security
25
Sep
2024

Timeshare Owner? The Mexican Drug Cartels Want You – Krebs on Security

The FBI is warning timeshare owners to be wary of a prevalent telemarketing scam involving a violent Mexican drug cartel…

Naveen Goud
25
Sep
2024

Kaspersky causes new data security concerns while leaving the United States

A few months ago, the Biden administration imposed a trade and operations ban on Kaspersky, giving the company approximately 90…

Splinter Post-Exploitation Tool
25
Sep
2024

Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool

Sep 25, 2024Ravie LakshmananPenetration Testing / Cyber Threat Cybersecurity researchers have flagged the discovery of a new post-exploitation red team…

CrowdStrike apologises to US government for global mega-outage
25
Sep
2024

CrowdStrike apologises to US government for global mega-outage

A senior CrowdStrike executive has apologised in front of a United States government committee for the 19 July outage that…

Social Media
25
Sep
2024

A Serious Risk For Businesses

Social media is no longer just an image sharing or content sharing medium. There is a darker underbelly to it….

What is a bug bounty program? A guide for businesses
25
Sep
2024

What is a bug bounty program? A guide for businesses

Bug bounty programs have proven to be an effective strategy for companies looking to proactively enhance their security posture. As…

Winamp
25
Sep
2024

Winamp releases source code, asks for help modernizing the player

The iconic Winamp media player has fulfilled a promise made in May and released its complete source code on GitHub,…

TeamViewer for Windows Vulnerability Let Attackers Escalate Privileges
25
Sep
2024

TeamViewer for Windows Vulnerability Let Attackers Escalate Privileges

TeamViewer’s Remote client software for Windows has discovered a critical security vulnerability. This vulnerability could potentially allow attackers to elevate…

DragonForce Ransomware Expands RaaS, Targets Firms Worldwide
25
Sep
2024

DragonForce Ransomware Expands RaaS, Targets Firms Worldwide

DragonForce ransomware is expanding its RaaS operation and becoming a global cybersecurity threat against businesses. Companies must implement strong cybersecurity…

Malwarebytes Personal Data Remover protects user privacy
25
Sep
2024

Malwarebytes Personal Data Remover protects user privacy

Malwarebytes introduced its latest consumer product, Personal Data Remover, designed to protect user privacy by assisting users with the deletion…