Cyber security adoption is vital to Scotland’s space race
07
Aug
2024

Cyber security adoption is vital to Scotland’s space race

It has been described in various evocative ways across popular culture, reflecting its vastness and potential for discovery. But, as…

Nexera Crypto Hack
07
Aug
2024

Nexera Crypto Hacked, But Company Claims Only $440K Stolen

In yet another significant blow to the cryptocurrency ecosystem, blockchain platform Nexera has fallen victim to a major hack. While…

Phishing Attacks Can bypass Microsoft 365 Email Safety Warnings
07
Aug
2024

Phishing Attacks Can bypass Microsoft 365 Email Safety Warnings

A vulnerability in Microsoft 365’s anti-phishing measures allows malicious actors to deceive users into opening harmful emails by hiding the…

Hackers Leveraging OneDrive Or Google Drive To Hide Malicious Traffic
07
Aug
2024

Hackers Leveraging OneDrive Or Google Drive To Hide Malicious Traffic

Attackers, including nation-state actors, increasingly leverage legitimate cloud services for espionage operations, exploiting their low-profile and cost-effective nature.  The services,…

AWS Launches Mithra To Detect Malicious Domains Across Systems
07
Aug
2024

AWS Launches Mithra To Detect Malicious Domains Across Systems

Amazon’s e-commerce platforms and cloud services form a digital ecosystem requiring a strong cybersecurity framework. Amazon, which has a vast…

What Employers and Tech Pros Are Looking For
07
Aug
2024

What Employers and Tech Pros Are Looking For

07 Aug Cybersecurity Certifications: What Employers and Tech Pros Are Looking For Posted at 09:03h in Blogs by Di Freeze…

CrowdStrike engages external experts, details causes of massive outage
07
Aug
2024

CrowdStrike engages external experts, details causes of massive outage

CrowdStrike has published a technical root cause analysis of what went wrong when a content update pushed to its Falcon…

RHADAMANTHYS Stealer Weaponizing RAR Archive To Steal Login Credentials
07
Aug
2024

RHADAMANTHYS Stealer Weaponizing RAR Archive To Steal Login Credentials

A newly surfaced cybercampaign targeting Israeli users has thrust the sophisticated RHADAMANTHYS information stealer into the spotlight. Originating from Russian-speaking…

Researchers Proposed MME Framework To Enhance API Sequence-Based Malware Detection
07
Aug
2024

Researchers Proposed MME Framework To Enhance API Sequence-Based Malware Detection

Deep learning models analyzing API sequences for Windows malware detection face challenges due to evolving malware variants. A group of…

The Art of Possible: Redefining Cybersecurity in the Age of Data as the New Perimeter
07
Aug
2024

The Art of Possible: Redefining Cybersecurity in the Age of Data as the New Perimeter

I have now had the privilege of attending RSA for over 20 years, yet this conference never grows old! My…

Microsoft 365 Vulnerability Let Hackers Bypass Anti-phishing Feature
07
Aug
2024

Microsoft 365 Vulnerability Let Hackers Bypass Anti-phishing Feature

A vulnerability in Microsoft 365 (formerly Office 365) has been found that allows malicious actors to bypass anti-phishing measures. One…

CrowdStrike
07
Aug
2024

CrowdStrike Reveals Root Cause of Global System Outages

Aug 07, 2024Ravie LakshmananCybersecurity / Incident Response Cybersecurity company CrowdStrike has published its root cause analysis detailing the Falcon Sensor…