Specops brute force attacks
10
Sep
2024

How to defend against brute force and password spray attacks

From zero-day exploits to polymorphic malware, today’s organizations must protect themselves against increasingly sophisticated cyber threats. But while these types of complex attack vectors…

Predator Spyware Exploiting “one-click” & “zero-click” Flaws
10
Sep
2024

Predator Spyware Exploiting “one-click” & “zero-click” Flaws

Recent research indicates that the Predator spyware, once thought to be inactive due to US sanctions, has resurfaced with enhanced…

Forrester: IT budget growth pushed towards cross-functional teams
10
Sep
2024

Forrester: IT budget growth pushed towards cross-functional teams

IT leaders plan to spend more in 2025 compared to 2024, the Budget planning guides from analyst Forrester has reported….

Chinese hackers use new data theft malware in govt attacks
10
Sep
2024

Chinese hackers use new data theft malware in govt attacks

New attacks attributed to China-based cyber espionage group Mustang Panda show that the threat actor switched to new strategies and…

WhatsApp View Once Privacy Flaw Exploited by Attackers in the Wild
10
Sep
2024

WhatsApp View Once Privacy Flaw Exploited by Attackers in the wild

WhatsApp’s “View Once” feature, designed to enhance privacy by allowing users to send photos and videos that disappear after being…

BBTok Abuses Legitimate Windows Utility Command Tool
10
Sep
2024

BBTok Abuses Legitimate Windows Utility Command Tool

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions and judicial-related matters.  By leveraging trust…

AI in the enterprise: How to build an AI dataset
10
Sep
2024

AI in the enterprise: How to build an AI dataset

Finding and acquiring the right data to build an enterprise dataset is perhaps the most critical task facing organisations that…

Researchers Trace Loki Backdoor To Mythic Framework
10
Sep
2024

Researchers Trace Loki Backdoor To Mythic Framework

In July 2024, researchers discovered a previously unknown backdoor, which they have dubbed Loki. After a thorough analysis of the…

German intelligence says Russian GRU group behind NATO, EU cyberattacks
10
Sep
2024

German intelligence says Russian GRU group behind NATO, EU cyberattacks – Security

Germany’s domestic intelligence agency has warned against a cyber group belonging to Russian military intelligence (GRU) Unit 29155, saying it…

7777
10
Sep
2024

Quad7 botnet targets more SOHO and VPN routers, media servers

The Quad7 botnet is evolving its operation by targeting additional SOHO devices with new custom malware for Zyxel VPN appliances, Ruckus wireless…

Best EasyDMARC Replacement Option-  PowerDMARC
10
Sep
2024

Best EasyDMARC Replacement Option-  PowerDMARC

A report by Egress indicates that 94% of organizations have reported email security incidents like phishing attacks! This is why…

Vulnerabilities in IBM Products Let Attackers Exploit & Launch DOS Attack
10
Sep
2024

Vulnerabilities in IBM Products Let Attackers Exploit & Launch DOS Attack

IBM has issued a security bulletin addressing critical vulnerabilities in its MQ Operator and Queue Manager container images. These vulnerabilities,…