Best Practices for Event Logging & Threat Detection
24
Aug
2024

Best Practices for Event Logging & Threat Detection

The National Security Agency (NSA) has released the Best Practices for Event Logging and Threat Detection across cloud services, enterprise…

U.S. DOJ Sues Georgia Tech For Cybersecurity Failings
24
Aug
2024

U.S. DOJ Sues Georgia Tech For Cybersecurity Failings

The U.S. Department of Justice has filed a lawsuit against the Georgia Institute of Technology – better known as Georgia…

Zimbabwe Officials Trained In 4-Day Cybersecurity Session
24
Aug
2024

Zimbabwe Officials Trained In 4-Day Cybersecurity Session

Zimbabwe’s government has taken a significant step to prioritize the growth of national cybersecurity capabilities by conducting a program where…

Shimano Di2 Bicycles
24
Aug
2024

Researchers Discover Vulnerability In Shimano Di2 Bicycles

Researchers have recently uncovered vulnerabilities in the popular Shimano Di2 electronic gear-shifting system, raising concerns about the security of these…

Qilin ransomware steals credentials stored in Google Chrome
24
Aug
2024

Qilin ransomware steals credentials stored in Google Chrome

Qilin ransomware steals credentials stored in Google Chrome Pierluigi Paganini August 23, 2024 Sophos researchers investigated a Qilin ransomware breach…

Ham radio user
23
Aug
2024

American Radio Relay League confirms $1 million ransom payment

Image: Midjourney The American Radio Relay League (ARRL) confirmed it paid a $1 million ransom to obtain a decryptor to…

innovator-spotlight-armorcode
23
Aug
2024

Innovator Spotlight: ArmorCode – Cyber Defense Magazine

As the world of software development accelerates, the need to secure applications from the earliest stages of development has become…

funeral
23
Aug
2024

Fake funeral “live stream” scams target grieving users on Facebook

Some scammers have the morals of an alley cat. But some sink even lower. Over the last few months, Malwarebytes…

Phishing attacks target mobile users via progressive web applications (PWA)
23
Aug
2024

Phishing attacks target mobile users via progressive web applications (PWA)

Phishing attacks target mobile users via progressive web applications (PWA) Pierluigi Paganini August 23, 2024 Cybercriminals use progressive web applications (PWA)…

Linux
23
Aug
2024

Microsoft shares temp fix for Linux boot issues on dual-boot systems

​Microsoft has provided a workaround to temporarily fix a known issue that is blocking Linux from booting on dual-boot systems…

Security teams vs cybercriminals: Who’s most likely to benefit from AI?
23
Aug
2024

Security teams vs cybercriminals: Who’s most likely to benefit from AI?

Forget Game of Thrones and House of The Dragon; the real battle for power is between cyber criminals and security…

Member of cybercrime group Karakurt charged in the US
23
Aug
2024

Member of cybercrime group Karakurt charged in the US

Member of cybercrime group Karakurt charged in the US Pierluigi Paganini August 23, 2024 The Russian national Deniss Zolotarjovs has…