16 Common Types Of Cyberattacks And How To Prevent Them
26
Mar
2024

2 Artificial Intelligence (AI) Cybersecurity Stocks To Buy: CrowdStrike And Tenable

26 Mar 2 Artificial Intelligence (AI) Cybersecurity Stocks To Buy: CrowdStrike And Tenable This week in cybersecurity from the editors…

GitGuardian SCA automates vulnerability detection and prioritization for enhanced code health
26
Mar
2024

GitGuardian SCA automates vulnerability detection and prioritization for enhanced code health

GitGuardian has released its Software Composition Analysis (SCA) module. SCA directly impacts the health of organizations’ codebase by automating vulnerability…

Cyber Espionage
26
Mar
2024

U.S. Charges 7 Chinese Nationals in Major 14-Year Cyber Espionage Operation

The U.S. Department of Justice (DoJ) on Monday unsealed indictments against seven Chinese nationals for their involvement in a hacking…

Goldman Sachs discusses virtues of Kubernetes for virtual machine management
26
Mar
2024

Goldman Sachs discusses virtues of Kubernetes for virtual machine management

At the KubeCon and CloudNativeCon event in Paris earlier this month, Red Hat and Goldman Sachs discussed the benefits of…

Rank Math Plugin Vulnerability
26
Mar
2024

Risk To 2M WordPress Sites

A Rank Math plugin vulnerability affects over 2 million WordPress websites. The flaw, identified as a Stored Cross-Site Scripting (XSS)…

Hackers Exploiting SQL Injection Flaws
26
Mar
2024

Hackers Exploiting SQL Injection Flaws

CISA and the FBI released the Secure by Design Alert to address SQL injection vulnerabilities in software that affect thousands…

Award Winning Cyber Start-up Raises £3m Led By Fuel Ventures To Empower Employees To Protect Themselves
26
Mar
2024

Award Winning Cyber Start-up Raises £3m Led By Fuel Ventures To Empower Employees To Protect Themselves

Today, Think Cyber Security Ltd has announced that it has raised a £3 million late seed funding round to deliver measurable…

Tycoon 2FA Phishing Kit Attacking Microsoft 365 & Gmail Users
26
Mar
2024

Tycoon 2FA Phishing Kit Attacking Microsoft 365 & Gmail Users

Hackers use 2FA (Two-Factor Authentication) phishing kits to overcome the additional security layer provided by 2FA.  These kits typically mimic…

Best Practices for Kafka Management to Ensure High Availability
26
Mar
2024

Best Practices for Kafka Management to Ensure High Availability

Best Practices for Kafka Management to Ensure High Availability 7 With the increasing popularity of Apache Kafka as a distributed…

Which? calls for government action on fake banking sites
26
Mar
2024

Which? calls for government action on fake banking sites

Thousands of fraudulent websites that appear to be those of the UK’s largest retail banks – but are, of course,…

CVE-2024-21762 Exploit Sale
26
Mar
2024

CVE-2024-21762 Exploit Sale Targets FortiOS SSL VPN

Threat actor Hunt3rkill3rs1 is offering a CVE-2024-21762 exploit sale on a dark web forum. The exploit is designed to capitalize…

DEI and the Recruitment Wall
26
Mar
2024

DEI and the Recruitment Wall

Diversity, Equity and Inclusion (DEI) initiatives are now well established in cybersecurity with only 8% of businesses saying they did…