Magnet Goblin Hacker Group
11
Mar
2024

Magnet Goblin Hacker Group Leveraging 1-Day Exploits to Deploy Nerbian RAT

Mar 11, 2024NewsroomZero-Day / Endpoint Security A financially motivated threat actor called Magnet Goblin is swiftly adopting one-day security vulnerabilities…

Google Is Getting Thousands of Deepfake Porn Complaints
11
Mar
2024

Google Is Getting Thousands of Deepfake Porn Complaints

Each method is weaponized—almost always against women—to degrade, harass, or cause shame, among other harms. Julie Inman Grant, Australia’s e-safety…

10 free cybersecurity guides you might have missed
11
Mar
2024

10 free cybersecurity guides you might have missed

This collection of free cybersecurity guides covers a broad range of topics, from resources for developing cybersecurity programs to specific…

Progress Software OpenEdge Vulnerability
11
Mar
2024

Proof-of-Concept Exploit Released for Progress Software OpenEdge Vulnerability

Mar 11, 2024NewsroomNetwork Security / Vulnerability Technical specifics and a proof-of-concept (PoC) exploit have been made available for a recently…

Cyberattacks On Baltic States: Russian Influence And Disruption
11
Mar
2024

Cyberattacks On Baltic States: Russian Influence And Disruption

A recent security report from Lithuania highlights a concerning increase in Russian influence operations targeting the Baltic States and Poland….

Malware Families Adapting To COM Hijacking Technique For Persistence
11
Mar
2024

Malware Families Adapting To COM Hijacking Technique For Persistence

COM (Component Object Model) hijacking is a technique in which threat actors exploit the core architecture of Windows by adding…

Essential Security Certifications for Consumer Mobile Devices: A Comprehensive Guide
11
Mar
2024

A Comprehensive Guide to Mobile Application Security Testing

With the rapid proliferation of mobile applications across various industries, ensuring the security of these apps has become paramount. Mobile…

Transitioning to memory-safe languages: Challenges and considerations
11
Mar
2024

Transitioning to memory-safe languages: Challenges and considerations

In this Help Net Security interview, Omkhar Arasaratnam, General Manager at the Open Source Security Foundation (OpenSSF), discusses the evolution…

Difference between Whale Phishing and Spear Phishing
11
Mar
2024

Microsoft suspects Russian hackers still lurking in its corporate network

In a recent statement, Microsoft, the American software behemoth, has raised concerns over the presence of Russian state-funded hackers within…

Advanced AI, analytics, and automation are vital to tackle tech stack complexity
11
Mar
2024

Advanced AI, analytics, and automation are vital to tackle tech stack complexity

97% of technology leaders find traditional AIOps models are unable to tackle the data overload, according to Dynatrace. Organizations are…

NTT Ltd. is becoming NTT DATA
11
Mar
2024

NTT Ltd. is becoming NTT DATA – Partner Content

The creation of NTT DATA has brought together the capabilities, services and talents of NTT DATA and NTT Ltd. around…

Qantas outlines tech transformation targets for next two years
11
Mar
2024

Qantas appoints new group CIO and CISO – Training & Development

Qantas has appointed Andre Walduck as its new group chief information officer and made Matt Biber its permanent group chief…