Security testing for eCommerce websites and retailers 
19
Feb
2024

Security testing for eCommerce websites and retailers 

Security testing for eCommerce websites has become indispensable for online retailers, as it plays a vital role in safeguarding customer…

Android
19
Feb
2024

Anatsa Android malware downloaded 150,000 times via Google Play

The Anatsa banking trojan has been targeting users in Europe by infecting Android devices through malware droppers hosted on Google…

GL-AX1800 Router Vulnerability Let Attackers Execute Remote Code
19
Feb
2024

GL-AX1800 Router Vulnerability Let Attackers Execute Remote Code

A recent analysis of the GL-AX1800 router by researchers revealed the presence of several security vulnerabilities that attackers could exploit…

Akira Ransomware Exploiting Cisco Anyconnect Vulnerability
19
Feb
2024

Akira Ransomware Exploiting Cisco Anyconnect Vulnerability

Threat actors exploit Cisco AnyConnect vulnerabilities to gain unauthorized access to networks, compromise sensitive information, and potentially execute malicious activities. …

Exploring the Phenomenal Rise of Ethereum as a Digital Asset
19
Feb
2024

Exploring the Phenomenal Rise of Ethereum as a Digital Asset

In this exploration, we delve into the multifaceted layers of Ethereum’s meteoric rise, dissecting the technological breakthroughs, the vibrant community…

RCE vulnerabilities fixed in SolarWinds enterprise solutions
19
Feb
2024

RCE vulnerabilities fixed in SolarWinds enterprise solutions

SolarWinds has released updates for Access Rights Manager (ARM) and (Orion) Platform that fix vulnerabilities that could allow attackers to…

Network Detection and Response (NDR)
19
Feb
2024

How to Achieve the Best Risk-Based Alerting (Bye-Bye SIEM)

Did you know that Network Detection and Response (NDR) has become the most effective technology to detect cyber threats? In…

Controversial Post Office Capture system was developed in-house
19
Feb
2024

Controversial Post Office Capture system was developed in-house

The Post Office’s second controversial accounting system, known as Capture, was developed in-house in the early 1990s. Following the explosion…

Chinese Ministry of Public Security Breach
19
Feb
2024

Chinese Ministry Of Public Security Breach: Data On GitHub

A massive data breach originating from a private industry contractor of the Chinese Ministry of Public Security (MPS), known as…

'broke.af' goes offline as Afghan web domains suspended
19
Feb
2024

‘broke.af’ goes offline as Afghan web domains suspended – Telco/ISP

More than 100 Afghan websites have been suspended after a French internet services firm failed to make payments to the…

How BRICS Got "Rug Pulled" – Cryptocurrency Counterfeiting is on the Rise
19
Feb
2024

How BRICS Got “Rug Pulled” – Cryptocurrency Counterfeiting is on the Rise

How BRICS Got “Rug Pulled” – Cryptocurrency Counterfeiting is on the Rise Pierluigi Paganini February 19, 2024 Resecurity has identified…

LabHost Employs Phishing-as-a-Service Steal Banking Credentials
19
Feb
2024

LabHost Employs Phishing-as-a-Service Steal Banking Credentials

LabHost group has been discovered to be targeting Canadian Banks with Phishing-as-a-service attacks. Phishing-as-a-service (PhaaS) groups have been on the…