Hackers Can Use DNS TXT Records to Execute the Malware
30
Jun
2023

Hackers Can Use DNS TXT Records to Execute the Malware

DNS TXT record enables domain administrators to input text into DNS, initially for human-readable notes, but now it’s utilized for…

Proxyjacking Campaign
30
Jun
2023

Cybercriminals Hijacking Vulnerable SSH Servers in New Proxyjacking Campaign

Jun 30, 2023Ravie LakshmananServer Security / Cyber Threat An active financially motivated campaign is targeting vulnerable SSH servers to covertly…

What secure coding practices mean to modern cyber security
30
Jun
2023

The time to implement an internal AI usage policy is now

The use of artificial intelligence (AI) in organisations is increasingly widespread, thanks to its ability to increase efficiency, reduce the…

TSMC ransomware
30
Jun
2023

TSMC Says Supplier Hacked After Ransomware Group Claims Attack on Chip Giant

The LockBit ransomware group claims to have hacked Taiwan Semiconductor Manufacturing Company (TSMC), but the chip giant says only one…

WhatsApp
30
Jun
2023

WhatsApp Upgrades Proxy Feature Against Internet Shutdowns

Jun 30, 2023Ravie LakshmananPrivacy / Tech Meta’s WhatsApp has rolled out updates to its proxy feature, allowing more flexibility in…

30
Jun
2023

Turf Hack Team Claims The OkCupid Cyber Attack

The internationally operating dating and friendship website, OkCupid was claimed to be attacked by the cybercriminal group, Türk Hack Team….

Patch Tuesday: Critical Flaws in Adobe Commerce Software
30
Jun
2023

Proton Launches Open Source Password Manager

Internet privacy company Proton this week announced the global launch of its open source password manager, Proton Pass. The password…

10 Best Practices to Enhance Office 365 Security
30
Jun
2023

10 Best Practices to Enhance Office 365 Security

Cloud service providers fundamentally changed the way we do business in 2023. Office 365 is one of the most popular…

30
Jun
2023

Anonymous Sudan Launches Cyber Attack On Department Of Commerce

The United States Department of Commerce (DOC) has allegedly become the target of a cyber attack. Falcon Feed, a threat…

Top 25 Most Dangerous Software Weaknesses
30
Jun
2023

Top 25 Most Dangerous Software Weaknesses

The top 25 most dangerous software weaknesses impacting software for the previous two calendar years have been published by MITRE…

NHS data breach after ransomware attack on University of Manchester
30
Jun
2023

NHS data breach after ransomware attack on University of Manchester

A ransomware attack on University of Manchester (UoM) has led to the data breach of over a million patients related…

How 5G Technology Accelerates Cybersecurity
30
Jun
2023

How 5G Technology Accelerates Cybersecurity

In the digital age, where connectivity and data exchange play a crucial role, cybersecurity has become a paramount concern. The…