NIST Encryption Tools for Quantum
15
Aug
2024

NIST Finalised 3 Encryption Algorithms for Cyberattacks On Quantum Computers

NIST, an agency in the federal government of the United States (US), has finished its first draft of cryptographic algorithms…

News Malspam Attacks AnyDesk and Microsoft Teams
15
Aug
2024

News Malspam Attacks AnyDesk and Microsoft Teams

Cybersecurity researchers have uncovered a sophisticated malspam campaign targeting unsuspecting users through email and phone calls. Attackers are leveraging popular…

Jane Devry
15
Aug
2024

Transforming Network Security for the Digital Age with SASE

In the final week of the Tour de France, cyclists endure grueling conditions of hills, heat, and pain over 21…

Hide yo environment files! Or risk getting your cloud-stored data stolen and held for ransom
15
Aug
2024

Hide yo environment files! Or risk getting your cloud-stored data stolen and held for ransom

Cybercriminals are breaking into organizations’ cloud storage containers, exfiltrating their sensitive data and, in several cases, have been paid off…

Number of girls taking A-level computing exceeds 3,000
15
Aug
2024

Number of girls taking A-level computing exceeds 3,000

The number of girls choosing to take computing at A-level in 2024 increased by almost 800 students, pushing the total…

Microsoft 365 (Office)
15
Aug
2024

Microsoft shares temp fix for Outlook, Word crashes when typing

​Microsoft has shared a temporary fix for a known issue that causes Microsoft 365 apps like Outlook, Word, and OneNote…

Cyclops
15
Aug
2024

Malware Platform “Cyclops” Allows Hackers to Write Arbitrary Commands

Researchers have uncovered a new and previously undocumented malware platform named “Cyclops.” Written in the Go programming language, Cyclops has…

Ransomware Group Added a New EDR Killer Tool to their arsenal
15
Aug
2024

Ransomware Group Added a New EDR Killer Tool to their arsenal

A ransomware group known as RansomHub has been found deploying a new tool designed to disable endpoint detection and response…

Jane Devry
15
Aug
2024

Cryptography: A Forgotten Part of Software Supply Chain Security

Securing the software supply chain has become a top priority due to high-profile breaches and increasing regulatory scrutiny. International agencies…

Cybercrime Magazine Heads To Fire Island For The Day
15
Aug
2024

Cybercrime Magazine Heads To Fire Island For The Day

15 Aug Cybercrime Magazine Heads To Fire Island For The Day Posted at 09:21h in Blogs by Di Freeze This…

New Threat Actors Tools Found to be Bypassed Antivirus & Delete Backups
15
Aug
2024

Threat Actors Tools Found to be Bypassed Antivirus & Delete Backups

A recent Digital Forensics and Incident Response (DFIR) report has uncovered various sophisticated tools threat actors employ to bypass major…

Nearly All Google Pixel Phones Exposed by Unpatched Flaw in Hidden Android App
15
Aug
2024

Nearly All Google Pixel Phones Exposed by Unpatched Flaw in Hidden Android App

Google’s flagship Pixel smartphone line touts security as a centerpiece feature, offering guaranteed software updates for seven years and running…