Google Removes Swing VPN Android App Exposed as DDoS Botnet
17
Jul
2023

Google Removes Swing VPN Android App Exposed as DDoS Botnet

The app under discussion, Swing VPN – Fast VPN Proxy, was uncovered as a DDoS botnet by a cybersecurity researcher…

Steps Involved In Penetration Testing And Their Methodology In Cybersecurity
16
Jul
2023

Steps Involved In Penetration Testing And Their Methodology In Cybersecurity

Let’s explore the steps involved in penetration testing and the methodology employed by cybersecurity professionals to conduct effective and comprehensive…

Data theft
16
Jul
2023

Gamaredon hackers start stealing data 30 minutes after a breach

Ukraine’s Computer Emergency Response Team (CERT-UA) is warning that the Gamaredon hacking operates in rapid attacks, stealing data from breached…

Dating Apps And Sites: Mitigating Chargebacks In 2023
16
Jul
2023

Will AI-Generated Cyberattacks Surge In The Future?

by Emily Newton AI’s popularity has skyrocketed in recent years. Generative tools like ChatGPT have captivated individuals and businesses alike,…

Docker
16
Jul
2023

Thousands of images on Docker Hub leak auth secrets, private keys

Researchers at the RWTH Aachen University in Germany published a study revealing that tens of thousands of container images hosted…

Windows 11
16
Jul
2023

Windows Copilot arrives in the fall with Windows 11 23H2

Windows 11 is taking a step further into the world of artificial intelligence with the introduction of Windows Copilot, its…

Genesis Market Dark Web Domain and Infrastructure Sold to Anonymous Buyer
16
Jul
2023

Dark Web Domain of Genesis Market and Infrastructure Sold

The apparent successful sale took place despite the FBI’s takedown and seizure of the clearnet domain and infrastructure of Genesis…

WormGPT, a generative AI tool to launch sophisticated BEC attacksSecurity Affairs
16
Jul
2023

WormGPT, a generative AI tool to launch sophisticated BEC attacksSecurity Affairs

The WormGPT case: How Generative artificial intelligence (AI) can improve the capabilities of cybercriminals and allows them to launch sophisticated…

Common ISO/IEC 27001 Pitfalls and How to Avoid Them
16
Jul
2023

Common ISO/IEC 27001 Pitfalls and How to Avoid Them

By Megan Turner, Technical Specialist of Information Security, With cyberattacks at an all-time high, it’s necessary for businesses to implement…

Ransomware, extortionware, and theft: Are your security strategies really working?
16
Jul
2023

Ransomware, extortionware, and theft: Are your security strategies really working?

By Jerald Dawkins, Ph.D., CTO, Reflecting on attacks in 2022, reaffirmed what many other reports have stated – that ransomware…

16
Jul
2023

Week in review: Malware delivery via Microsoft Teams, law firms under cyberattack, CVSS 4.0 is out

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: CISO perspective on why boards…

Dating Apps And Sites: Mitigating Chargebacks In 2023
16
Jul
2023

Cybersecurity Regulations: The Half-Yearly Report Card

20,000. That was the approximate number of public suggestions the Indian government received in May over its crucial data privacy…