Change Healthcare logo
16
Apr
2024

New ransomware group demands Change Healthcare ransom

The Change Healthcare ransomware attack has taken a third cruel twist. A new ransomware group, RansomHub, has listed the organisation…

Malware Attacks
16
Apr
2024

TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks

Apr 16, 2024NewsroomThreat Intelligence / Endpoint Security The threat actor tracked as TA558 has been observed leveraging steganography as an…

CISOs not yet convinced to invest in AI
16
Apr
2024

CISOs not yet convinced to invest in AI

With the use of artificial intelligence (AI) by threat actors limited largely to crafting more effective social engineering and phishing…

A renewed espionage campaign targets South Asia with iOS spyware LightSpy
16
Apr
2024

A renewed espionage campaign targets South Asia with iOS spyware LightSpy

A renewed espionage campaign targets South Asia with iOS spyware LightSpy Pierluigi Paganini April 16, 2024 Researchers warn of a…

Pentest People Becomes the First Leeds-based Cybersecurity Company to Achieve NCSC’s Cyber Advisor (Cyber Essentials) Accreditation
16
Apr
2024

Pentest People Becomes the First Leeds-based Cybersecurity Company to Achieve NCSC’s Cyber Advisor (Cyber Essentials) Accreditation

Pentest People, the Penetration Testing as a Service (PTaaS®) and cybersecurity experts, today announces it is the first Leeds-based cybersecurity…

TA558 Hackers Compromised
16
Apr
2024

Connect:fun Attacking Organizations Running FortiClient EMS

A new exploit campaign has emerged, targeting organizations that utilize Fortinet’s FortiClient EMS. Dubbed “Connect:fun” by Forescout Research – Vedere…

Global Hack Exposes Personal Data: Implications & Privacy Protection
16
Apr
2024

Global Hack Exposes Personal Data: Implications & Privacy Protection

In a digital age where information is the new currency, the recent global hack has once again highlighted the urgent…

"CTRL, ALT, HACKED" Launched On The Cybercrime Radio Podcast
16
Apr
2024

Annual Cybersecurity Training Isn’t Working, So What’s The Alternative?

16 Apr Annual Cybersecurity Training Isn’t Working, So What’s The Alternative? Posted at 09:23h in Blogs by Di Freeze This…

New open-source project takeover attacks spotted, stymied
16
Apr
2024

New open-source project takeover attacks spotted, stymied

The OpenJS Foundation has headed off a “credible takeover attempt” similar to the one that resulted in a backdoor getting…

Giant Tiger logo
16
Apr
2024

Giant Tiger breach sees 2.8 million records leaked

Someone has posted a database of over 2.8 million records to a hacker forum, claiming they originated from a March…

Misinformation and hacktivist campaigns targeting the Philippines skyrocket
16
Apr
2024

Misinformation and hacktivist campaigns targeting the Philippines skyrocket

Misinformation and hacktivist campaigns targeting the Philippines skyrocket Pierluigi Paganini April 16, 2024 Amidst rising tensions with China in the…

Popular VPN Software Flaw Let Attackers Crash the Systems
16
Apr
2024

Popular VPN Software Flaw Let Attackers Crash the Systems

A critical vulnerability has been discovered in a widely used virtual private network (VPN) software, Libreswan, putting millions of users…