FIN7 Attacking IT Employees
22
Apr
2024

Apple Removes WhatsApp & Threads from its App Store for China

With the tightening grip of Chinese regulatory measures on foreign digital services, Apple Inc. has removed several major messaging apps,…

Citrix UberAgent Vulnerability Allows Attackers To Escalate Privileges
22
Apr
2024

Citrix UberAgent Vulnerability Allows Privilege Escalation

Citrix’s uberAgent, a sophisticated monitoring tool used to enhance performance and security across Citrix platforms, has been identified as having…

EASA Alerts Airlines Amid Suspected Cyber-Attacks on UK-Bound Flights
22
Apr
2024

EASA Alerts Airlines Amid Suspected Cyber-Attacks on UK-Bound Flights

European Union Aviation Safety Agency (EASA) has issued a cautionary alert following reports of cyber-attacks targeting flights bound for the…

The first steps of establishing your cloud security strategy
22
Apr
2024

The first steps of establishing your cloud security strategy

In this article, we’ll identify some first steps you can take to establish your cloud security strategy. We’ll do so…

AI-Fueled Cyber Espionage
22
Apr
2024

North Korean Hackers Turn to AI-Fueled Cyber Espionage

Apr 22, 2024NewsroomCryptocurrency / Artificial Intelligence Microsoft has revealed that North Korea-linked state-sponsored cyber actors has begun to use artificial…

+17K WordPress websites infected with the Balada Injector
22
Apr
2024

A flaw in the Forminator plugin impacts hundreds of thousands of WordPress sites

A flaw in the Forminator plugin impacts hundreds of thousands of WordPress sites Pierluigi Paganini April 22, 2024 Japan’s CERT…

Detectify is now available on AWS Marketplace
22
Apr
2024

Detectify is now available on AWS Marketplace

We’re pleased to share that our External Attack Surface Management (EASM) solution is now available on AWS Marketplace through private…

North Koreans Secretly Animated Amazon and Max Shows, Researchers Say
22
Apr
2024

North Koreans Secretly Animated Amazon and Max Shows, Researchers Say

Some file names gave away clues about the series and episode numbers. There were also files and projects the researchers…

Safeguarding Your Gmail Account: Strategies to Defend Against Fraud
22
Apr
2024

Safeguarding Your Gmail Account: Strategies to Defend Against Fraud

In today’s digital age, email has become an indispensable tool for communication, both personal and professional. Among the most widely…

Cloud Console Cartographer: Open-source tool helps security teams transcribe log activity
22
Apr
2024

Cloud Console Cartographer: Open-source tool helps security teams transcribe log activity

Cloud Console Cartographer is an open-source tool that maps noisy log activity into highly consolidated, succinct events to help security…

How to optimize your bug bounty programs
22
Apr
2024

How to optimize your bug bounty programs

In this Help Net Security interview, Roy Davis, Manager – Vulnerability Management & Bug Bounty at Zoom, discusses the role…

Uncertainty is the most common driver of noncompliance
22
Apr
2024

Uncertainty is the most common driver of noncompliance

Most compliance leaders tend to focus on building an ethical culture in their organizations to improve employee behavior, but it…