Jane Devry
03
Jul
2024

How to Combat Financial Crime and Achieve Business Success with KYB

According to the Office of the Comptroller of the Currency, “Financial crime threatens the safety and soundness of financial systems…

Not necessary program
03
Jul
2024

Parsec.App.0 – parsecd.exe – Program Information

PARSECD.EXE Information This is a valid program but it is not required to run on startup. This program is not…

Jane Devry
03
Jul
2024

Protecting the Mental Health of Cybersecurity Leaders

Last year was a brutal year in the cybersecurity field. Technologies like generative AI introduced new attack vectors to already…

Cobalt Strike attack chain
03
Jul
2024

Operation Morpheus took down 593 Cobalt Strike servers used by threat actors

Operation Morpheus took down 593 Cobalt Strike servers used by threat actors Pierluigi Paganini July 03, 2024 An international law…

DDoS
03
Jul
2024

OVHcloud blames record-breaking DDoS attack on MikroTik botnet

OVHcloud, a global cloud services provider and one of the largest of its kind in Europe, says it mitigated a…

Jane Devry
03
Jul
2024

Best 7 SOC 2 Compliance Software in 2024

With data breaches making the headlines more often, companies are well aware that keeping data safe and meeting compliance standards…

Former Post Office chair 'regrets' keeping critical Horizon report secret
03
Jul
2024

Former Post Office chair ‘regrets’ keeping critical Horizon report secret

Former Post Office chair Tim Parker said he “regrets” taking advice from the organisation’s legal chief to keep secret a…

Coordinated Takedown Disrupts Cobalt Strike Abuse
03
Jul
2024

Coordinated Takedown Disrupts Cobalt Strike Abuse

In a coordinated takedown, law enforcement and cybersecurity firms joined forces to cripple cybercriminals’ misuse of a legitimate security tool…

Hand sifting through data
03
Jul
2024

Infostealer malware logs used to identify child abuse website members

Thousands of pedophiles who download and share child sexual abuse material (CSAM) were identified through information-stealing malware logs leaked on…

Windows Recall preview
03
Jul
2024

Windows Recall Remains Insecure, Researcher Says

Microsoft’s planned Windows Recall feature remains vulnerable to cyberattacks in its latest version, according to a security researcher – even…

Authy
03
Jul
2024

Hackers abused API to verify millions of Authy MFA phone numbers

Twilio has confirmed that an unsecured API endpoint allowed threat actors to verify the phone numbers of millions of Authy…

The Not-So-Secret Network Access Broker x999xx – Krebs on Security
03
Jul
2024

The Not-So-Secret Network Access Broker x999xx – Krebs on Security

Most accomplished cybercriminals go out of their way to separate their real names from their hacker handles. But among certain…