ANZ transaction tracer joins AFP-led real-time data enabled crime crackdown
25
Jun
2024

ANZ transaction tracer joins AFP-led real-time data enabled crime crackdown – Finance – Security

ANZ Banking Group has embedded one of its transaction-tracing specialists into a joint initiative between the financial services sector and…

Julian Assange Freed: WikiLeaks Founder Released in Stunning Deal with U.S.
25
Jun
2024

WikiLeaks Founder Released After 5 Years

London, June 25, 2024—In a dramatic and unexpected turn of events, WikiLeaks founder Julian Assange has been released from prison…

Breaking down the numbers: Q2 2024 cybersecurity funding activity recap
25
Jun
2024

Breaking down the numbers: Q2 2024 cybersecurity funding activity recap

We present a list of selected cybersecurity companies that received funding during the second quarter of 2024 (Q2 2024). Alethea…

WordPress
25
Jun
2024

Hackers Create Rogue Admin Accounts

Jun 25, 2024NewsroomWordPress / Web Security Multiple WordPress plugins have been backdoored to inject malicious code that makes it possible…

RAT Malware
25
Jun
2024

BREAKING: NHS England’s Synnovis Hit by Massive Cyber Attack – GBHackers on Security

In a shocking development, the NHS has revealed that it was the victim of a major cyber attack targeting Synnovis….

Zeek: Open-source network traffic analysis, security monitoring
25
Jun
2024

Zeek: Open-source network traffic analysis, security monitoring

Zeek is an open-source network analysis framework. Unlike an active security device such as a firewall, Zeek operates on a…

Cybercrime Spree
25
Jun
2024

4 FIN9-linked Vietnamese Hackers Indicted in $71M U.S. Cybercrime Spree

Jun 25, 2024NewsroomCyber Crime / Financial Fraud Four Vietnamese nationals with ties to the FIN9 cybercrime group have been indicted…

CISOs' new ally: Qualys CyberSecurity Asset Management 3.0
25
Jun
2024

CISOs’ new ally: Qualys CyberSecurity Asset Management 3.0

In this Help Net Security interview, Kunal Modasiya, VP of Product Management and Growth at Qualys, explores the key features,…

Guide to mitigating credential stuffing attacks
25
Jun
2024

Guide to mitigating credential stuffing attacks

We have a collective unaddressed weakness when it comes to basic cybersecurity. Out of the many reports circulating in the…

CDK Global Cyberattack, CDK Global
25
Jun
2024

CDK Global Cyberattack Becomes A Supply Chain Attack For Dealers

Last week’s ransomware attack on software as a service (SaaS) provider CDK Global has had a ripple effect on its…

Apple Vision Pro
25
Jun
2024

Apple Vision Pro ‘Bug’ Can Be Exploited To Generate 3D Objects

A recently discovered vulnerability (CVE-2024-27812) in the Apple Vision Pro headset allowed hackers to bypass device security mechanisms and flood…

CDK hack upends US auto industry
25
Jun
2024

CDK hack upends US auto industry – Security

US auto dealers continue to grapple with an ongoing cyber attack-led software outage, with some reverting to manual paperwork as…