Ensuring Data Security in Retail ERP
25
Jan
2024

Ensuring Data Security in Retail ERP

Retail ERP systems are typically integrated with other key business systems, including eсommerce platforms, procurement and HR software, CRM, and…

Russian hackers breached Microsoft, HPE corporate maliboxes
25
Jan
2024

Russian hackers breached Microsoft, HPE corporate maliboxes

Cozy Bear (aka Midnight Blizzard, aka APT29) has been busy hacking and spying on big tech companies: both Microsoft and…

NCSC warns
25
Jan
2024

AI likely to boost ransomware, warns government body

The British National Cyber Security Centre (NCSC) says it expects Artificial Intelligence (AI) to heighten the global ransomware threat. In…

LODEINFO Fileless Malware
25
Jan
2024

LODEINFO Fileless Malware Evolves with Anti-Analysis and Remote Code Tricks

Jan 25, 2024NewsroomFileless Malware / Endpoint Security Cybersecurity researchers have uncovered an updated version of a backdoor called LODEINFO that’s…

Researchers find flaw in Mend.io security platform
25
Jan
2024

Bugcrowd sees surge in vulnerability submissions, led by public sector

Multi-solution crowdsourced cyber security platform Bugcrowd says it saw growing acceptance and adoption of crowdsourced security strategies among mainstream end-user…

Hackers target WordPress database plugin active on 1 million sites
25
Jan
2024

Hackers target WordPress database plugin active on 1 million sites

Malicious activity targeting a critical severity flaw in the ‘Better Search Replace’ WordPress plugin has been detected, with researchers observing…

5379 GitLab Servers are Vulnerable to Zero-Click Takeover Attacks
25
Jan
2024

5379 GitLab Servers are Vulnerable to Zero-Click Takeover Attacks

GitLab has released important security fixes for versions 16.7.2, 16.6.4, and 16.5.6 for GitLab Community Edition (CE) and Enterprise Edition…

The sophistication of cybercriminals intensifies with emerging strategies for cashing in or causing chaos
25
Jan
2024

The sophistication of cybercriminals intensifies with emerging strategies for cashing in or causing chaos

While tried and true tactics like phishing and malware are here to stay, there are always new approaches to watch…

Webinar
25
Jan
2024

Kasseika Ransomware Exploits Driver Functionality to Kill Antivirus

Ransomware is a tool that hackers use to extort money from their targets like individuals, businesses, and governments. The malware…

Pwn2Own Automotive: Tesla, Sony, Alpine Players Breached on Day One
25
Jan
2024

Tesla, Sony, Alpine Players Breached on Day One

Pwn2Own Automotive 2024 takes place in Tokyo, Japan, from January 24 to 26. The Pwn2Own Automotive 2024 hacking contest, taking…

Regula introduces smart testing for remote onboarding efficiency
25
Jan
2024

Regula introduces smart testing for remote onboarding efficiency

Currently, over 75% of countries worldwide use electronic documents equipped with NFC chips. Due to this fact, virtually every business…

Critical Jenkins Vulnerability
25
Jan
2024

Critical Jenkins Vulnerability Exposes Servers to RCE Attacks

Jan 25, 2024NewsroomVulnerability / Software Security The maintainers of the open-source continuous integration/continuous delivery and deployment (CI/CD) automation software Jenkins…