All-in-One Cybersecurity Platform
22
Jul
2024

Why All-in-One Platforms Are the Future of Cybersecurity

Once upon a time, I.T. security teams depended on hodgepodges of different cybersecurity solutions from various vendors. However, these multivendor…

Linux
22
Jul
2024

New Play ransomware Linux version targets VMware ESXi VMs

Play ransomware is the latest ransomware gang to start deploying a dedicated Linux locker for encrypting VMware ESXi virtual machines….

69% of API services were susceptible to Denial of Service (DoS) attacks
22
Jul
2024

GraphQL Security Report 2024: Uncovering Alarming Vulnerabilities

GraphQL, a flexible and efficient query language for APIs, is seeing rapid adoption across enterprises. A recent report titled “The…

Chinese Vigorish Viper Exploits DNS and Football Sponsorships for Illegal Gambling
22
Jul
2024

Chinese Vigorish Viper Exploits DNS and Football Sponsorships for Illegal Gambling

Unmasking Vigorish Viper: The Elusive Cybercrime Network Behind Illegal Gambling. Learn how this sophisticated group uses clever DNS tactics and…

Interview: Embedding better accessibility in software and websites
22
Jul
2024

Interview: Embedding better accessibility in software and websites

A graphical user interface (GUI) is the way many people interact with computing devices, ranging from smartphones and smart TVs,…

Gavel
22
Jul
2024

Los Angeles Superior Court shuts down after ransomware attack

The largest trial court in the United States, the Superior Court of Los Angeles County, closed all 36 courthouse locations…

Threat Actors Hijacking Facebook Accounts With Password Stealing Malware
22
Jul
2024

Threat Actors Hijacking Facebook Accounts With Password Stealing Malware

Threat actors leverage social media to deploy malware, such as the SYS01 stealer, which steals Facebook credentials and spreads through…

vCISO Reporting
22
Jul
2024

How to Increase Engagement with Your Cybersecurity Clients Through vCISO Reporting

As a vCISO, you are responsible for your client’s cybersecurity strategy and risk governance. This incorporates multiple disciplines, from research…

NCA cracks digitalstress DDoS-for-hire operation
22
Jul
2024

NCA cracks digitalstress DDoS-for-hire operation

The UK’s National Crime Agency (NCA) has infiltrated and disrupted digitalstress.su, an underground criminal marketplace that hired infrastructure out to…

Police infiltrates, takes down DigitalStress DDoS-for-hire service
22
Jul
2024

Police infiltrates, takes down DigitalStress DDoS-for-hire service

DDoS-for-hire service DigitalStress was taken down on July 2 in a joint law enforcement operation led by the United Kingdom’s…

Konfety Hackers Hosted apps on Google’s Play Store to Push Malicious Ads
22
Jul
2024

Konfety Hackers Hosted apps on Google’s Play Store to Push Malicious Ads

Researchers discovered a new ad fraud scheme named Konfety that leverages “decoy twin” apps on official marketplaces and their malicious…

Naveen Goud
22
Jul
2024

Indian PM Narender Modi asks to Log Off of each Microsoft Windows Sessions

Indian Prime Minister Narendra Modi has offered a valuable tip to enhance cybersecurity for home PCs and laptops: consistently logging…