The importance of a good API security strategy
21
Feb
2024

The importance of a good API security strategy

In 2024, API requests accounted for 57% of dynamic internet traffic around the globe, according to the Cloudflare 2024 API…

VietCredCare Stealer
21
Feb
2024

New ‘VietCredCare’ Stealer Targeting Facebook Advertisers in Vietnam

Feb 21, 2024NewsroomMalware / Cyber Threat Facebook advertisers in Vietnam are the target of a previously unknown information stealer dubbed…

ZDI discloses four zero-day flaws in Microsoft Exchange
21
Feb
2024

Microsoft Exchange flaw CVE-2024-21410 could impact up to 97,000 servers

Microsoft Exchange flaw CVE-2024-21410 could impact up to 97,000 servers Pierluigi Paganini February 21, 2024 Researchers from Shadowserver Foundation identified…

Authorities Warns Of North Korean Attackers Stealing Military Technologies
21
Feb
2024

Authorities Warns Of North Korean Attackers Stealing Military Technologies

Threat actors target military technologies to gain a strategic advantage, access classified information, and compromise national security.  Recently, Germany’s BfV…

VMware Urges to Remove EAP Plugin to Stop Hijack Attacks
21
Feb
2024

VMware Urges to Remove EAP Plugin to Stop Hijack Attacks

VMware has issued an urgent advisory to administrators to remove a deprecated authentication plugin vulnerable to severe security threats. The…

Definition of Data Resilience and Cyber Resilience and their attainment
21
Feb
2024

Definition of Data Resilience and Cyber Resilience and their attainment

1. Data Resilience: Data resilience refers to the ability of data to remain available and in-tact despite various challenges or…

10 cybersecurity startups to watch in 2024
21
Feb
2024

10 cybersecurity startups to watch in 2024

At Help Net Security, we’ve been following the cybersecurity business landscape closely for the past 25 years. Through our Industry…

Disinformation and Credential-Harvesting Attacks
21
Feb
2024

Russian Hackers Target Ukraine with Disinformation and Credential-Harvesting Attacks

Feb 21, 2024NewsroomPhishing Attack / Information Warfare Cybersecurity researchers have unearthed a new influence operation targeting Ukraine that leverages spam…

Flying into cloud – EasyJet’s journey out of the datacentre to AI
21
Feb
2024

Flying into cloud – EasyJet’s journey out of the datacentre to AI

Thank you for joining! Access your Pro+ Content below. 20 February 2024 Flying into cloud – EasyJet’s journey out of…

SugarLocker member arrest
21
Feb
2024

SugarLocker Member Arrest: Russian Enforcement Takes Lead

Russian authorities have detained a hacker named Aleksandr Ermakov, believed to be behind the notorious SugarLocker ransomware attacks, which have…

VMware client plug-in has critical vulnerability
21
Feb
2024

VMware client plug-in has critical vulnerability – Security

A deprecated authentication plug-in for VSphere, the enhanced authentication plug-in (EAP), carries two vulnerabilities, one critical, and should be disabled…

Critical infrastructure software maker confirms ransomware attack   Bill   16:29
21
Feb
2024

Critical infrastructure software maker confirms ransomware attack

PSI Software SE, a German software developer for complex production and logistics processes, has confirmed that the cyber incident it disclosed…