Dating Apps And Sites: Mitigating Chargebacks In 2023
23
Aug
2023

North East BIC Cyber Attack: ALPHV Claims 317GB Data

The ALPHV ransomware group, also identified as Blackcat, has added a UK-based office space rental agency to its list of…

TP-Link Tapo L530E smart bulb flaws allow hackers to steal user passwordsSecurity Affairs
23
Aug
2023

TP-Link Tapo L530E smart bulb flaws allow hackers to steal user passwordsSecurity Affairs

Four vulnerabilities in the TP-Link Tapo L530E smart bulb and impacting the mobile app used to control them expose users…

Roblox Game Developers
23
Aug
2023

Over a Dozen Malicious npm Packages Target Roblox Game Developers

Aug 23, 2023THNSoftware Security / Malware More than a dozen malicious packages have been discovered on the npm package repository…

23
Aug
2023

Norway Cyber Attack: NoName Targets Critical Infrastructure

Yet again, the NoName ransomware group has targeted Norway, this time claiming an attack on nine critical infrastructures within the…

What is an SSL stripping attack
23
Aug
2023

Facebook users have little time left to make $725m data privacy claims

Facebook users who maintained active accounts between May 2007 and December 2022 are urged to take action and submit a…

how I bruteforced my way into your Active Directory – honoki
23
Aug
2023

how I bruteforced my way into your Active Directory – honoki

Last May, I discovered that a critical vulnerability I had reported earlier this year had resulted in my first CVE….

Leveraging ChatGPT to Alleviate Stress on Cybersecurity Teams
23
Aug
2023

Leveraging ChatGPT to Alleviate Stress on Cybersecurity Teams

In today’s fast-paced digital landscape, the role of security teams has become increasingly critical to safeguarding sensitive information and maintaining…

23
Aug
2023

The rise of the cloud-conscious adversary – Partner Content – Security

The opportunities and benefits of the cloud have created new business models for organisations. But at the same time, criminal…

23
Aug
2023

Cybercriminals turn to AI to bypass modern email security measures

Cybercriminals employ artificial intelligence (AI) to create complex email threats like phishing and business email compromise (BEC) attacks, while modern…

Vic trumpets digital driver licence trial success
23
Aug
2023

Vic trumpets digital driver licence trial success – Software

The Victorian government is claiming a success for its digital driver license (DDL) pilot in Ballarat, ahead of a statewide…

23
Aug
2023

Anticipating the next wave of IoT cybersecurity challenges

In this Help Net Security interview, Roland Atoui, Managing Director at Red Alert Labs, discusses the intricacies of transitioning from…

Palo Alto Networks closes door on TunnelCrack
23
Aug
2023

Palo Alto Networks closes door on TunnelCrack – Security – Networking

Palo Alto Networks has published its response to the TunnelCrack VPN eavesdropping technique that academics demonstrated earlier this month. The…