New Zealand Parliamentary Network Hacked by Chinese Hackers
26
Mar
2024

New Zealand Parliamentary Network Hacked by Chinese Hackers

New Zealand has joined the United Kingdom in strongly condemning the People’s Republic of China (PRC) for its state-backed cyber…

What is Global Threat Intelligence ?
26
Mar
2024

What is Global Threat Intelligence ?

Global threat intelligence (GTI) is crucial for cybersecurity as it offers real-time data on emerging and persistent cyber threats worldwide….

Enhancing The Nation’s Cybersecurity Workforce
26
Mar
2024

Enhancing The Nation’s Cybersecurity Workforce

Supporting Critical Infrastructure Resilience with Skill-Based Labor By Randall Sandone, Executive Director, Critical Infrastructure Resilience Institute at The Grainger College…

Top 3 Cybersecurity Tools to Protect Business Data
26
Mar
2024

Top 3 Cybersecurity Tools to Protect Business Data

Cybersecurity threats have increased over the years. Research shows that, on average, 2,200 cyber-attacks are happening daily, and a single…

16 Common Types Of Cyberattacks And How To Prevent Them
26
Mar
2024

2 Artificial Intelligence (AI) Cybersecurity Stocks To Buy: CrowdStrike And Tenable

26 Mar 2 Artificial Intelligence (AI) Cybersecurity Stocks To Buy: CrowdStrike And Tenable This week in cybersecurity from the editors…

GitGuardian SCA automates vulnerability detection and prioritization for enhanced code health
26
Mar
2024

GitGuardian SCA automates vulnerability detection and prioritization for enhanced code health

GitGuardian has released its Software Composition Analysis (SCA) module. SCA directly impacts the health of organizations’ codebase by automating vulnerability…

Cyber Espionage
26
Mar
2024

U.S. Charges 7 Chinese Nationals in Major 14-Year Cyber Espionage Operation

The U.S. Department of Justice (DoJ) on Monday unsealed indictments against seven Chinese nationals for their involvement in a hacking…

Goldman Sachs discusses virtues of Kubernetes for virtual machine management
26
Mar
2024

Goldman Sachs discusses virtues of Kubernetes for virtual machine management

At the KubeCon and CloudNativeCon event in Paris earlier this month, Red Hat and Goldman Sachs discussed the benefits of…

Rank Math Plugin Vulnerability
26
Mar
2024

Risk To 2M WordPress Sites

A Rank Math plugin vulnerability affects over 2 million WordPress websites. The flaw, identified as a Stored Cross-Site Scripting (XSS)…

Hackers Exploiting SQL Injection Flaws
26
Mar
2024

Hackers Exploiting SQL Injection Flaws

CISA and the FBI released the Secure by Design Alert to address SQL injection vulnerabilities in software that affect thousands…

Award Winning Cyber Start-up Raises £3m Led By Fuel Ventures To Empower Employees To Protect Themselves
26
Mar
2024

Award Winning Cyber Start-up Raises £3m Led By Fuel Ventures To Empower Employees To Protect Themselves

Today, Think Cyber Security Ltd has announced that it has raised a £3 million late seed funding round to deliver measurable…

Tycoon 2FA Phishing Kit Attacking Microsoft 365 & Gmail Users
26
Mar
2024

Tycoon 2FA Phishing Kit Attacking Microsoft 365 & Gmail Users

Hackers use 2FA (Two-Factor Authentication) phishing kits to overcome the additional security layer provided by 2FA.  These kits typically mimic…