The threat of KeyPlug against Italian industries
23
May
2024

The threat of KeyPlug against Italian industries

APT41: The threat of KeyPlug against Italian industries Pierluigi Paganini May 23, 2024 Tinexta Cyber’s Zlab Malware Team uncovered a…

Analog Launches Testnet, Allocates 2% Token Supply for Participants
23
May
2024

Analog Launches Testnet, Allocates 2% Token Supply for Participants

Analog’s Testnet is open for developers, community and validators, participants can complete quests and climb the ATP leaderboard to share…

Women In Cloud On Cybersecurity, Sponsored By Microsoft – Live Video Conference
23
May
2024

Women In Cloud On Cybersecurity, Sponsored By Microsoft – Live Video Conference

23 May Women In Cloud On Cybersecurity, Sponsored By Microsoft – Live Video Conference Posted at 09:41h in Blogs by…

Northern Ireland police face £750,000 fine after data protection blunder put lives at risks
23
May
2024

Northern Ireland police face £750,000 fine after data protection blunder put lives at risks

Northern Ireland’s police service faces a £750,000 fine from the data protection regulator after the police service mistakenly disclosed the…

Chinese Threat Actors Use ORB Networks To Evade Attribution
23
May
2024

Chinese Threat Actors Use ORB Networks To Evade Attribution

Cybersecurity defenders have widely relied on blocking attacker IP addresses through identified IOCs in response to threat actor campaigns. However,…

Ultra-Wideband Relay Attacks Tesla Model 3
23
May
2024

Latest Tesla Model Vulnerable To Relay Attacks

A new study reveals that Tesla’s keyless entry system in its latest Model 3 remains vulnerable to relay attacks despite…

The threat of KeyPlug against Italian industries
23
May
2024

The threat of KeyPlug against Italian industries

APT41: The threat of KeyPlug against Italian industries Pierluigi Paganini May 23, 2024 Tinexta Cyber’s Zlab Malware Team uncovered a…

Triage: The not-so-secret hack to impactful bug bounty programs 
23
May
2024

Triage: The not-so-secret hack to impactful bug bounty programs 

At the core of every thriving bug bounty platform lies its triage team. These teams evaluate vulnerability reports, deciding on…

Spyware App Found Running on Multiple US Hotel Computers
23
May
2024

Spyware App Found Running on Multiple US Hotel Computers

A consumer-grade spyware app named pcTattletale has been discovered running on the check-in systems of at least three Wyndham hotels…

SaaS Backup
23
May
2024

Are Your SaaS Backups as Secure as Your Production Data?

Conversations about data security tend to diverge into three main threads: How can we protect the data we store on…

Apple’s Wi-Fi Positioning Can Be System Abused To Track Users
23
May
2024

Apple’s Wi-Fi Positioning Can Be System Abused To Track Users

A new study by researchers at the University of Maryland has uncovered a privacy vulnerability in Apple’s Wi-Fi Positioning System…

Chinese APT Group
23
May
2024

Chinese APT Group’s Stealthy Tactics Exposed

May 23, 2024NewsroomCyber Espionage / Network Security Governmental entities in the Middle East, Africa, and Asia are the target of…