Plexal launches Cyber Runway 3.0 accelerator programme
16
May
2023

Plexal launches Cyber Runway 3.0 accelerator programme

London startup hub Plexal is launching its third Cyber Runway accelerator programme to provide more tailored support for security startups…

10 Ways to Hack Your “New Normal” Workweek
16
May
2023

Launching the Hacker Calendar, Never Miss a Challenge Again

HackerOne has a long history of running Hack Days. You might still remember our recent hack day where we launched…

Secure your organization's Mobile Endpoints
16
May
2023

Secure your organization’s Mobile Endpoints

Over the years, mobile devices like smartphones, tablets, and laptops have been extensively used to get work done, primarily due…

16
May
2023

Fraudsters send fake invoice, follow up with fake exec confirmation

Fraudsters are trying out a new approach to convince companies to pay bogus invoices: instead of hijacking existing email threads,…

CopperStealer Malware
16
May
2023

CopperStealer Malware Crew Resurfaces with New Rootkit and Phishing Kit Modules

May 16, 2023Ravie LakshmananOnline Security / Malware The threat actors behind the CopperStealer malware resurfaced with two new campaigns in…

Scality pushes anti-ransomware features in Artesca object storage
16
May
2023

Scality pushes anti-ransomware features in Artesca object storage

Scality has launched version 2.0 of its Artesca platform, with a big emphasis on the ransomware protection inherent to object storage and…

SPF Record Research - Detectify Blog
16
May
2023

SPF Record Research – Detectify Blog

To prevent email spoofing, it is important to manually configure email authentication systems to the highest standard. This is a…

Re-Victimization from Police-Auctioned Cell Phones – Krebs on Security
16
May
2023

Re-Victimization from Police-Auctioned Cell Phones – Krebs on Security

Countless smartphones seized in arrests and searches by police forces across the United States are being auctioned online without first…

16
May
2023

Secure Remote Access to All Environments

Operational technology (OT) cybersecurity is a challenging but critical aspect of protecting organizations’ essential systems and resources. Cybercriminals no longer…

NetApp to promise ransomware warranty payout
16
May
2023

NetApp to promise ransomware warranty payout

NetApp has made a series of nudges in several product areas that include new entry level ASA (All-SAN Array) block…

Smiley
16
May
2023

Open-source Cobalt Strike port ‘Geacon’ used in macOS attacks

Geacon, a Go-based implementation of the beacon from the widely abused penetration testing suite Cobalt Strike, is being used more and more…

CERT-In Issues Alert on Vulnerabilities in VMware, Patches Issued
16
May
2023

CERT-In Alert On Four Vulnerabilities In VMware, Patch Issued

The Indian Computer Emergency Response Team (CERT-IN) has issued an alert on vulnerabilities in VMware Aria Operations. Versions of VMware…