SentinelOne Singularity Cloud Native Security simulates harmless attacks on cloud infrastructure
08
May
2024

SentinelOne Singularity Cloud Native Security simulates harmless attacks on cloud infrastructure

Attackers are targeting the scope and scale of the cloud to run rapid and coordinated threat campaigns. A new approach…

ticket scam
08
May
2024

Desperate Taylor Swift fans defrauded by ticket scams

Ticket scams are very common and apparently hard to stop. When there are not nearly enough tickets for some concerts…

Barclays and HSBC Bank data breach
08
May
2024

Barclays And HSBC Bank Data Breach Claimed By Hacker Duo

Hackers IntelBroker and Sanggiero have claimed a data breach allegedly impacting HSBC Bank and Barclays Bank. The HSBC Bank data…

What you need to know
08
May
2024

What you need to know

To stay on top of relevant and emerging threats, CISOs must adjust and refine their cybersecurity strategies to address the…

City of Wichita Ransomware Attack: Services Impacted
08
May
2024

City of Wichita Ransomware Attack: Services Impacted

The City of Wichita, Kansas, experienced a disruption when it fell victim to a ransomware attack. This cyber assault encrypted…

Expert Insight: ‘Minding the gap’: how can we work to make cyber accessible for women?
08
May
2024

Expert Insight: ‘Minding the gap’: how can we work to make cyber accessible for women?

According to the Department for Science, Innovation and Technology (DSIT), only 17% of the UK cyber sector workforce is female,…

Hackers Employing Steganography Method to Deliver RemcosRAT
08
May
2024

Hackers Employing Steganography Method to Deliver RemcosRAT

Hackers are now using steganography techniques to distribute the notorious Remote Access Trojan (RAT) known as RemcosRAT. This method, which…

Attackers may be using TunnelVision to snoop on users' VPN traffic (CVE-2024-3661)
08
May
2024

Attackers may be using TunnelVision to snoop on users’ VPN traffic (CVE-2024-3661)

Researchers have brought to light a new attack method – dubbed TunnelVision and uniquely identified as CVE-2024-3661 – that can…

Hackers Using Weaponized Shortcut Files To Deploy CHM Malware
08
May
2024

Hackers Using Weaponized Shortcut Files To Deploy CHM Malware

Hackers exploit the weaponized shortcut files due to their ability to execute malicious code without knowing the user being targeted….

Overcoming Common Data Security Challenges
08
May
2024

Overcoming Common Data Security Challenges

By Claude Mandy, Chief Evangelist at Symmetry Systems Organizations depend on data to operate. From day-to-day operations to strategic decisions,…

CrushFTP Vulnerability Exploited in Wild to Execute Remote Code
08
May
2024

CrushFTP Vulnerability Exploited in Wild to Execute Remote Code

A critical vulnerability in CrushFTP, identified as CVE-2024-4040, has been actively exploited in the wild. It allows attackers to perform…

The Essential Requirements For Landing A Career In Cybersecurity
08
May
2024

Backstory Of The World’s Second CISO

08 May Backstory Of The World’s Second CISO Posted at 08:51h in Blogs by Di Freeze This week in cybersecurity…