Naveen Goud
24
Jun
2024

Top 10 Industries Most Vulnerable to Cyber Attacks

Cybersecurity threats continue to pose significant challenges across various industries, with certain sectors bearing the brunt of frequent and severe…

Android Ransomware Operation
24
Jun
2024

Multiple Threat Actors Deploying Open-Source Rafel RAT to Target Android Devices

Jun 24, 2024NewsroomMobile Security / Threat Intelligence Multiple threat actors, including cyber espionage groups, are employing an open-source Android remote…

Empowering Women In Cybersecurity: Insights From Irene Corpuz
24
Jun
2024

Empowering Women In Cybersecurity: Insights From Irene Corpuz

In a world increasingly dependent on digital infrastructure, the cybersecurity landscape continues to evolve, and so does the role of…

New North Korean Hackers Attack Aerospace and Defense Companies
24
Jun
2024

North Korean Hackers Attack Aerospace and Defense Companies

Security researchers have uncovered a sophisticated new malware campaign likely linked to North Korean hackers, targeting aerospace and defense companies…

Cracking down on cybercrime: Who you gonna call?
24
Jun
2024

Cracking down on cybercrime: Who you gonna call?

As cybercrime continues to grow, law enforcement agencies worldwide face increased challenges in safeguarding organizations and individuals. In this article,…

New RAT Malware SneakyChef & SugarGhost Attack Windows Systems - GBHackers on Security
24
Jun
2024

New RAT Malware SneakyChef & SugarGhost Attack Windows Systems – GBHackers on Security

Talos Intelligence has uncovered a sophisticated cyber campaign attributed to the threat actor SneakyChef. This operation leverages the SugarGh0st RAT…

Why are threat actors faking data breaches?
24
Jun
2024

Why are threat actors faking data breaches?

Earlier this year Europcar discovered a hacker selling info on its 50 million customers on the dark web. The European…

1 out of 3 breaches go undetected
24
Jun
2024

1 out of 3 breaches go undetected

Organizations continue to struggle in detecting breaches as they become more targeted and sophisticated, with more than 1 out of…

Enhancing Government Case Management: Six AI-Driven Use Cases
24
Jun
2024

Enhancing Government Case Management: Six AI-Driven Use Cases – Partner Content

Australia’s federal government has established a taskforce dedicated to ensuring the safe and responsible use of AI within the public…

Gumtree Group emerges from 18-month IT rebuild
24
Jun
2024

Gumtree Group emerges from 18-month IT rebuild – Cloud – Security – Software

Gumtree Group is emerging from a major 18-month program of work that saw it transform whole processes and stand up…

The Ultimate Guide To Buying A Server For Your Small Business
24
Jun
2024

The Ultimate Guide To Buying A Server For Your Small Business

Purchasing a server might be difficult. This is particularly valid for those making their first purchase. There will be a…

Apple and Meta have discussed AI partnership
24
Jun
2024

Apple and Meta have discussed AI partnership – Software – Hardware

Meta Platforms has discussed integrating its generative AI model into Apple’s recently announced AI system for iPhones, the Wall Street…