We’re Not There Yet - Women In Cybersecurity
08
Mar
2024

We’re Not There Yet – Women In Cybersecurity

By Zinet Kemal, Associate Cloud Security Engineer, Best Buy The cybersecurity space, as dynamic and challenging as it is, has…

Nigerian National Pleads Guilty for Hacking Business & Email
08
Mar
2024

Nigerian National Pleads Guilty for Hacking Business & Email

 Henry Onyedikachi Echefu, a 32-year-old Nigerian national, has admitted to his role in a sophisticated business email compromise (BEC) scheme…

Chinese Hackers Targeting with Watering Holes and Trojanized Software
08
Mar
2024

Chinese Evasive Panda Targets Tibetans with Nightdoor Backdoor

Cybersecurity researchers at ESET identified the cyberespionage campaign, highlighting how hackers compromised both the Tibetan news website Tibetpost and the…

Secrets Sensei
08
Mar
2024

Secrets Sensei: Conquering Secrets Management Challenges

Mar 08, 2024The Hacker NewsSecrets Management / Access Control In the realm of cybersecurity, the stakes are sky-high, and at…

Gitlab Authorization Vulnerability Let Attackers Steal Variables
08
Mar
2024

Gitlab Authorization Vulnerability Let Attackers Steal Variables

GitLab has announced the release of updated versions for its Community Edition (CE) and Enterprise Edition (EE) platforms. These updates…

International Women’s Day 2024: Inspiring inclusion for the next generation
08
Mar
2024

International Women’s Day 2024: Inspiring inclusion for the next generation

International Women’s Day has long been an advocate for elevating and advancing gender equality within the technology industry. At the…

Cisco patches Secure Client VPN flaw that could reveal authentication tokens (CVE-2024-20337)
08
Mar
2024

Cisco patches Secure Client VPN flaw that could reveal authentication tokens (CVE-2024-20337)

Cisco has fixed two high-severity vulnerabilities affecting its Cisco Secure Client enterprise VPN and endpoint security solution, one of which…

Android Malware-as-Service “Coper” Offering Features to Hackers
08
Mar
2024

Android Malware-as-Service “Coper” Offering Features to Hackers

The Coper malware, a descendant of the Exobot malware family, was first distributed as a fake version of Bancolombia’s ‘Personas’…

Championing Diversity in Data Protection
08
Mar
2024

Championing Diversity in Data Protection

By Jasmine Harrison PC.dp, Account Manager – Data Protection People Women play an important role in the field of data…

China Panda APT Hacking Websites To Infect Windows And MacOS Visitors With Malware
08
Mar
2024

China Panda APT Hacking Websites To Infect Windows And MacOS Visitors With Malware

Evasive Panda dubbed BRONZE HIGHLAND and Daggerfly, a Chinese-speaking APT group operating since at least 2012, has been spotted conducting cyberespionage…

CrowdStrike to Acquire Flow Security For Cloud Leadership
08
Mar
2024

CrowdStrike to Acquire Flow Security For Cloud Leadership

CrowdStrike announced its acquisition of Flow Security, the industry’s first cloud-native data runtime security solution.  This move positions CrowdStrike as…

UAC-0050 Hacked Thousands Of Email Addresses
08
Mar
2024

UAC-0050 Hacked Thousands Of Email Addresses

Threat actors target email addresses, as they provide a way to access personal and confidential information. Emails often hold valuable…