Nissan A/NZ's outsourced cyber incident call centre breached
22
May
2024

Nissan A/NZ’s outsourced cyber incident call centre breached – Security

Nissan Oceania has revealed the call centre it set up to handle customer inquiries after a cyber incident late last…

Hackerone logo
22
May
2024

What You Need to Know About the EU’s Cyber Resilience Act

The CRA Introduces Mandatory Cybersecurity Requirements The European CRA creates mandatory cybersecurity requirements for hardware and software with digital elements. The…

Windows 11
22
May
2024

Windows 11 24H2 now rolling out to Release Preview Insiders

Microsoft is rolling out Windows 11 24H2 to testers in the Release Preview Channel, confirming that it is in the…

Enhancing Security Solutions through AWS Marketplace Integration
22
May
2024

Enhancing Security Solutions through AWS Marketplace Integration

AI SPERA, a leader in Cyber Threat Intelligence (CTI) solutions, announced today that its proprietary search engine, Criminal IP, is…

Neom: The tip of the tech iceberg in the Saudi desert
22
May
2024

Neom: The tip of the tech iceberg in the Saudi desert

Even if only a fraction of what is planned gets implemented in Saudi Arabia’s Neom smart city project, it may…

Critical Veeam Backup Enterprise Manager auth bypass bug
22
May
2024

Critical Veeam Backup Enterprise Manager auth bypass bug

Critical Veeam Backup Enterprise Manager authentication bypass bug Pierluigi Paganini May 22, 2024 A critical security vulnerability in Veeam Backup…

State hackers increasingly rely on massive ORB proxy networks to evade detection
22
May
2024

State hackers turn to massive ORB proxy networks to evade detection

Security researchers are warning that China-linked state-backed hackers are increasingly relying on a vast proxy server network created from virtual…

Threat Actors Spoofing Pegasus Spyware Name to Sell Fake Code
22
May
2024

Hackers Sell Fake Pegasus Spyware on Clearnet and Dark Web

Be cautious! Hackers are selling fake Pegasus spyware source code, alerts CloudSEK. Learn how to protect yourself from this cyber…

Broadcom/VMware: Joining the dots to migrate off VMware
22
May
2024

Broadcom/VMware: Joining the dots to migrate off VMware

This week, there have been a few product announcements that illustrate the opportunity some IT firms see in targeting existing…

Cybercriminals are targeting elections in India with influence campaigns
22
May
2024

Cybercriminals are targeting elections in India with influence campaigns

Cybercriminals are targeting elections in India with influence campaigns Pierluigi Paganini May 22, 2024 Resecurity warns of a surge in…

LastPass
22
May
2024

LastPass is now encrypting URLs in password vaults for better security

LastPass announced it will start encrypting URLs stored in user vaults for enhanced privacy and protection against data breaches and unauthorized access….

Detecting A Phishing Attack With Help Of Artificial Intelligence
22
May
2024

Detecting A Phishing Attack With Help Of Artificial Intelligence

Social engineering email attacks remain a threat despite commercial solutions and user training focused on identifying phishing indicators like urgency,…