Why Security Awareness Training is Your Best Defense
13
Jun
2024

Why Security Awareness Training is Your Best Defense

Cybercriminals are constantly on the lookout for ways to infiltrate our devices and steal our personal information. Data breaches have…

Machine Learning
13
Jun
2024

New Attack Technique ‘Sleepy Pickle’ Targets Machine Learning Models

Jun 13, 2024NewsroomVulnerability / Software Security The security risks posed by the Pickle format have once again come to the…

Google fixed an actively exploited zero-day in the Pixel Firmware
13
Jun
2024

Google fixed an actively exploited zero-day in the Pixel Firmware

Google fixed an actively exploited zero-day in the Pixel Firmware Pierluigi Paganini June 13, 2024 Google is warning of a…

0day Vulnerability In 10,000 Web Apps Exploited Using XSS Payloads
13
Jun
2024

0day Vulnerability In 10,000 Web Apps Exploited Using XSS Payloads

A significant vulnerability, tracked as CVE-2024-37629, has been discovered in SummerNote 0.8.18. It allows Cross-Site Scripting (XSS) via the Code…

Google Pixel logo
13
Jun
2024

Update now! Google Pixel vulnerability is under active exploitation

Google has notified Pixel users about an actively exploited vulnerability in their phones’ firmware. Firmware is the code or program…

Data leakage in the cloud – can data truly be safe in the cloud?
13
Jun
2024

Data leakage in the cloud – can data truly be safe in the cloud?

As organisations store and process data in the cloud, there are increasing concerns from administrators, data owners and CISOs’ around…

A Modular Malware With Range Of Capabilities
13
Jun
2024

A Modular Malware With Range Of Capabilities

Hackers misuse malware for diverse illicit intentions, including data theft, disrupting systems, espionage, or distortion for unethical monetary benefits. Besides…

0day Vulnerability XSS Payloads
13
Jun
2024

Hackers Exploiting MS Office Editor Vulnerability Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group. The group has been exploiting a known…

The “Non-Trend” of “Full Automation” Workflows in Cybersecurity: A Reality Check
13
Jun
2024

The “Non-Trend” of “Full Automation” Workflows in Cybersecurity: A Reality Check

By Oren Koren, CPO & Co-Founder of VERITI It’s no surprise that there’s been a shift to automated workflows in…

2 Super Cybersecurity Stocks To Buy: SentinelOne And Tenable
13
Jun
2024

2 Super Cybersecurity Stocks To Buy: SentinelOne And Tenable

13 Jun 2 Super Cybersecurity Stocks To Buy: SentinelOne And Tenable Posted at 08:42h in Blogs by Di Freeze This…

Best practices to beat container misconfiguration
13
Jun
2024

Best practices to beat container misconfiguration

He urges IT decision-makers to strategise better and only shift what is optimum for the new environment – transforming assets…

Truist Bank Data Breach
13
Jun
2024

Truist Bank Data Breach And Kulicke & Soffa Cyberattacks

A threat actor on a dark web forum has listed data from Truist Bank for sale following a cyberattack on…