Apr 20, 2023Ravie LakshmananCyber Attack / Malware Telecommunication services providers in Africa are the target of a new campaign orchestrated…
All government departments and a selected number of arm’s length bodies are to have their cyber security postures reviewed under…
Guess what, hackers? We are back to Live Hacking Events! Hackers greeted each other with open arms after a two-year…
Israeli spyware maker NSO Group deployed at least three novel “zero-click” exploits against iPhones in 2022 to infiltrate defenses erected…
Public sector outsourcer Capita has confirmed that some confidential data was stolen from a small proportion of its server estate…
Global organizations are working towards making data privacy a fundamental right. However, as the privacy paradigm shifts to a digital…
Recently, the following agencies have published a joint advisory to warn of APT28, a Russian state-sponsored group that is found…
Salt Security have announced the addition of new advanced threat detection capabilities and improved API discovery to the Salt Security…
The X-Force team at IBM has recently found a new malware family known as “Domino,” made by ITG14, aka FIN7,…
Living without the Internet is hardly imaginable today. However, the anonymity of the internet has led to the flourishing of…
This is member content. Thank you for being a subscriber. .memberful-global-teaser-content p:last-child{ -webkit-mask-image: linear-gradient(180deg, #000 0%, transparent); mask-image: linear-gradient(180deg, #000…
Using xargs and awk in Bash to automate managing remote-hosted repositories. Few things are more satisfying to me than one…