Nespresso Domain Hijacked in Phishing Attack Targeting Microsoft Logins
23
Apr
2024

Nespresso Domain Hijacked in Phishing Attack Targeting Microsoft Logins

Beware! Cybercriminals are exploiting an open redirect vulnerability for phishing attacks that impersonate Nespresso to steal Microsoft logins. Millions of…

Veeam acquires Coveware to boost its ransomware protection
23
Apr
2024

Veeam acquires Coveware to boost its ransomware protection

Veeam, a leading provider of backup solutions, has announced its acquisition of Coveware, a cyber incident response firm, in a…

Cozy Bear hijacks SME Microsoft 365 tenants in latest campaign
23
Apr
2024

GooseEgg proves golden for Fancy Bear, says Microsoft

The Russia-backed advanced persistent threat (APT) operation tracked as Forest Blizzard by Microsoft – but more commonly known as Fancy…

State Department
23
Apr
2024

US imposes visa bans on 13 spyware makers and their families

​The Department of State has started imposing visa restrictions on mercenary spyware makers and peddlers, prohibiting their entry into the…

Forcepoint DSPM safeguards sensitive information by examining data context and content
23
Apr
2024

Forcepoint DSPM safeguards sensitive information by examining data context and content

Forcepoint has launched Forcepoint Data Security Posture Management (DSPM), driven by AI to deliver real-time visibility, ease privacy compliance and…

Dependency Confusion Attack
23
Apr
2024

Apache Cordova App Harness Targeted in Dependency Confusion Attack

Apr 23, 2024NewsroomSupply Chain Attack / Application Security Researchers have identified a dependency confusion vulnerability impacting an archived Apache project…

Enterprise AI: Free, premium or a bolt-on?
23
Apr
2024

Enterprise AI: Free, premium or a bolt-on?

The latest data from analyst Gartner shows a 10% spike in the datacentre market, driven predominantly by hyperscalers deploying artificial…

Hackers hijack antivirus updates to drop GuptiMiner malware
23
Apr
2024

Hackers hijack antivirus updates to drop GuptiMiner malware

North Korean hackers have been exploiting the updating mechanism of the eScan antivirus to plant backdoors on big corporate networks and…

Expert Insight: Outdated Recruitment Methods Are Impeding The Global Cyber Army
23
Apr
2024

Expert Insight: Outdated Recruitment Methods Are Impeding The Global Cyber Army

Cybersecurity is ‘inclusive’ by nature: no one is exempt from the fallout of the expanding cyber threat landscape. The notion,…

Invicti Predictive Risk Scoring identifies highest-risk applications
23
Apr
2024

Invicti Predictive Risk Scoring identifies highest-risk applications

Invicti announced its new AI-enabled Predictive Risk Scoring capability. The feature assigns predicted risk to applications and helps organizations gain…

UnitedHealth Group logo
23
Apr
2024

“Substantial proportion” of Americans may have had health and personal data stolen in Change Healthcare breach

UnitedHealth Group has given an update on the February cyberattack on Change Healthcare, one of its subsidiaries. In the update,…

Mizuho Financial Group trials generative AI for development and maintenance
23
Apr
2024

Austrian AI: from academia to commercial success and beyond

Austria’s success in artificial intelligence (AI) research and development largely stems from an academic realm of young thinkers, budding entrepreneurs…