Deep dive: How Pure Fusion plans to implement storage classes
09
Jul
2024

Deep dive: How Pure Fusion plans to implement storage classes

Flash storage pioneer Pure Storage recently announced it will upgrade its Fusion control plane to make storage capacity in its…

Hackerone logo
09
Jul
2024

What Is the Digital Operational Resilience Act (DORA)?

DORA focuses on Information and Communications Technology (ICT) systems and applies to all financial institutions in the EU. This includes…

how-to-prepare-for-iso-270012022s-threat-intelligence-requirements
09
Jul
2024

How to Prepare for ISO 27001:2022’s Threat Intelligence Requirements

Countdown to October 2025 As the cybersecurity landscape continues to evolve and become more complex, international regulations are similarly following…

Grappling With The Cybersecurity Talent Shortfall
09
Jul
2024

Grappling With The Cybersecurity Talent Shortfall

09 Jul Grappling With The Cybersecurity Talent Shortfall Posted at 08:48h in Blogs by Di Freeze This week in cybersecurity…

GuardZoo spyware used by Houthis to target military personnel
09
Jul
2024

GuardZoo spyware used by Houthis to target military personnel

Lookout discovered GuardZoo, Android spyware targeting Middle Eastern military personnel. This campaign leverages malicious apps with military and religious themes…

Jenkins Groovy Plugin
09
Jul
2024

Hackers Exploiting Jenkins Script Console for Cryptocurrency Mining Attacks

Jul 09, 2024NewsroomCI/CD Security / Server Security Cybersecurity researchers have found that it’s possible for attackers to weaponize improperly configured…

Data is the key to unlocking the UK’s AI potential
09
Jul
2024

Data is the key to unlocking the UK’s AI potential

While data has the potential to boost the UK economy significantly, the links between data and AI are not sufficiently…

Chinese Cyber Group Exploits Home Devices
09
Jul
2024

Chinese Cyber Group Exploits Home Devices

The UK and its international allies have issued a new advisory shedding light on the evolving techniques of China state-sponsored…

Massive Truecaller Data Leak Exposes 273 Million Indian Users’ Information
09
Jul
2024

Massive Truecaller Data Leak Exposes 273 Million Indian Users’ Information

A massive data leak involving Truecaller, the popular caller ID and spam-blocking app, has reportedly exposed the personal information of…

From Passwords to Passkeys: Tailoring Your Business Journey
09
Jul
2024

From Passwords to Passkeys: Tailoring Your Business Journey

The FIDO Alliance is working to enable a world without passwords in which passkeys implement secure, phishing-resistant authentication based on public key…

New Golang-Based Botnet "Zergeca" Unveiled by XLab Researchers
09
Jul
2024

New Golang Botnet “Zergeca” Discovered, Delivers Brutal DDoS Attacks

New Golang botnet “Zergeca” evades detection and launches DDoS attacks. Ensure your IoT devices are fully patched against vulnerabilities and…

Chinese APT40 group swifly leverages public PoC exploits
09
Jul
2024

Chinese APT40 group swifly leverages public PoC exploits

Chinese state-sponsored cyber group APT40 is amazingly fast at adapting public proof-of-concept (PoC) exploits for vulnerabilities in widely used software,…