Malicious Software Updates
05
Aug
2024

China-Linked Hackers Compromise ISP to Deploy Malicious Software Updates

Aug 05, 2024Ravie LakshmananBrowser Security / Windows Security The China-linked threat actor known as Evasive Panda compromised an unnamed internet…

How to optimise SAM budget in today’s heterogeneous environments
05
Aug
2024

How to optimise SAM budget in today’s heterogeneous environments

Overspending awaits the unwary when managing heterogeneous IT environments incorporating on-premise software, cloud apps and software as a service (SaaS),…

China-linked APT41 breached Taiwanese research institute
05
Aug
2024

China-linked APT41 breached Taiwanese research institute

China-linked APT41 breached Taiwanese research institute Pierluigi Paganini August 05, 2024 China-linked group APT41 breached a Taiwanese government-affiliated research institute…

Naveen Goud
05
Aug
2024

Threat Actor offers Car Selling Phishing lure

According to a study made by Palo Alto Networks cyber threat arm ‘Unit 42’, a threat actor named APT28 aka…

Rockwell Automation
05
Aug
2024

Critical Flaw in Rockwell Automation Devices Allows Unauthorized Access

Aug 05, 2024Ravie LakshmananNetwork Security / Vulnerability A high-severity security bypass vulnerability has been disclosed in Rockwell Automation ControlLogix 1756…

Mobile Guardian Data Breach: MOE Orders App Removal
05
Aug
2024

Mobile Guardian Data Breach: MOE Orders App Removal

The Ministry of Education (MOE) of Singapore announced on August 5 the removal of the Mobile Guardian app from all…

Naveen Goud
05
Aug
2024

Safeguarding Data in Container Security Environments

In today’s rapidly evolving tech landscape, containers have become a cornerstone of modern software development and deployment. Their efficiency, scalability,…

MISP: Open-source threat intelligence and sharing platform
05
Aug
2024

MISP: Open-source threat intelligence and sharing platform

MISP is an open-source threat intelligence and sharing platform for collecting, storing, distributing, and sharing cybersecurity indicators and threats related…

Android Trojan
05
Aug
2024

New Android Trojan “BlankBot” Targets Turkish Users’ Financial Data

Aug 05, 2024Ravie LakshmananMobile Security / Financial Security Cybersecurity researchers have discovered a new Android banking trojan called BlankBot targeting…

HDMI Cables steal Passwords
05
Aug
2024

Hackers Can Use HDMI Cables to Capture Your Passwords

Security researchers have discovered a new way that hackers can steal sensitive information, like passwords. This involves eavesdropping on HDMI…

The role of AI in cybersecurity operations
05
Aug
2024

The role of AI in cybersecurity operations

Security operation centers (SOCs) need to be better equipped to manage the sheer scale of data to monitor and the…

How to start your cybersecurity career: Expert tips and guidance
05
Aug
2024

How to start your cybersecurity career: Expert tips and guidance

As businesses strive to protect their data and privacy, the demand for skilled cybersecurity professionals continues to grow. This article…