Securing Against a Different Type of Identity Threat
29
Apr
2024

Securing Against a Different Type of Identity Threat

29 Apr Securing Against a Different Type of Identity Threat Posted at 13:20h in Blogs by Di Freeze Non-human accounts:…

Malicious Apps in Play Store
29
Apr
2024

Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023

Apr 29, 2024NewsroomMobile Security / Hacking Google on Monday revealed that almost 200,000 app submissions to its Play Store for…

London Drugs
29
Apr
2024

London Drugs pharmacy chain closes stores after cyberattack

​Canadian pharmacy chain London Drugs has closed all its retail stores to contain what it described as a “cybersecurity incident.”…

29
Apr
2024

UK to Take Steps in Helping Protect Consumers Against Cyber Threats from Smart Devices

The UK has taken a pioneering step by introducing new laws aimed at safeguarding consumers against hacking and cyber-attacks while…

Hackerone logo
29
Apr
2024

Kubernetes — A Journey Has Just Begun

Deciding that the first stop in the Journey should be a CI cluster, the team started drafting plans. Plans on how…

Google
29
Apr
2024

Google rejected 2.28 million risky Android apps from Play store in 2023

Google blocked 2.28 million Android apps from being published on Google Play after finding various policy violations that could threaten user’s security….

Ransomware criminals target backups for assured ransom
29
Apr
2024

Cyber Attack forces London Drugs to close temporarily

London Drugs, a British Columbia-based company with a robust pharmaceutical supply chain serving Western Canada, recently announced the closure of…

R Programming Vulnerability
29
Apr
2024

New R Programming Vulnerability Exposes Projects to Supply Chain Attacks

Apr 29, 2024NewsroomProgramming / Supply Chain A security vulnerability has been discovered in the R programming language that could be…

Windows 11
29
Apr
2024

Microsoft fixes bug behind incorrect BitLocker encryption errors

Microsoft has fixed a known issue causing incorrect BitLocker drive encryption errors in some managed Windows environments. The company said…

Hackers Tool 29 Days from Hack to Sabotage Ransomware Attack
29
Apr
2024

Hackers Tool 29 Days from Hack to Sabotage Ransomware Attack

Cybersecurity experts have meticulously traced the timeline of a sophisticated ransomware attack that spanned 29 days from the initial breach…

UK enacts IoT cybersecurity law
29
Apr
2024

UK enacts IoT cybersecurity law

The Product Security and Telecommunications Infrastructure (PSTI) Act has come into effect today, requiring manufacturers of consumer-grade IoT products sold…

Map Internet on Global Scale
29
Apr
2024

China-Linked ‘Muddling Meerkat’ Hijacks DNS to Map Internet on Global Scale

Apr 29, 2024NewsroomDNS Security / Cyber Espionage A previously undocumented cyber threat dubbed Muddling Meerkat has been observed undertaking sophisticated…