Why Higher Education Is So Vulnerable to Cyber Attacks — And What to Do
28
Feb
2024

Why Higher Education Is So Vulnerable to Cyber Attacks — And What to Do

By Zac Amos, Features Editor, ReHack Cyberattacks are a growing problem worldwide as they can cause significant damage to any…

Calendar Meeting Links Used to Spread Mac Malware – Krebs on Security
28
Feb
2024

Calendar Meeting Links Used to Spread Mac Malware – Krebs on Security

Malicious hackers are targeting people in the cryptocurrency space in attacks that start with a link added to the target’s…

FBI, CISA warns Of ALPHV Blackcat Ransomware Attacking Hospitals
28
Feb
2024

FBI, CISA warns Of ALPHV Blackcat Ransomware Attacking Hospitals

To raise awareness of the ALPHV Blackcat ransomware as a service (RaaS) that targets the US healthcare industry, the FBI, CISA,…

Equip And Educate Students To Combat Cyberthreats
28
Feb
2024

Freelance TV Presenter Paid To Pose As A Crypto CEO. Millions Lost In The Hyperverse Scam.

28 Feb Freelance TV Presenter Paid To Pose As A Crypto CEO. Millions Lost In The Hyperverse Scam. This week…

One year later, Rhadamanthys is still dropped via malvertising
28
Feb
2024

One year later, Rhadamanthys is still dropped via malvertising

It was just a little over a year ago that the Rhadamanthys stealer was first publicly seen distributed via malicious…

IR35 compliance review: HMRC applauded over handling of 18-month investigation
28
Feb
2024

IR35 reforms: PAC concerned HMRC’s ‘tough’ enforcement is harming contractors

The Public Accounts Committee (PAC) has concerns that HM Revenue & Customs’ (HMRC) “tough approach” to enforcing the IR35 tax…

Unmasking 2024's Email Security Landscape
28
Feb
2024

Unmasking 2024’s Email Security Landscape

Unmasking 2024’s Email Security Landscape Pierluigi Paganini February 28, 2024 Analyzing the Email Security Landscape and exploring Emerging Threats and…

Epic games
28
Feb
2024

“Zero evidence” we were hacked by Mogilevich gang

Epic Games said they found zero evidence of a cyberattack or data theft after the Mogilevich extortion group claimed to…

Russian Hackers Hijack Ubiquiti Routers To Proxy Network
28
Feb
2024

Russian Hackers Hijack Ubiquiti Routers To Proxy Network

Threat actors hijack routers to gain unauthorized access to network traffic. This enables them to monitor, manipulate, or intercept sensitive…

Synopsys Report: 74% of Codebases Harbour High-Risk Open Source Vulnerabilities, Up 54%
28
Feb
2024

Synopsys Report: 74% of Codebases Harbour High-Risk Open Source Vulnerabilities, Up 54%

Synopsys has unveiled the ninth edition of its annual “Open Source Security and Risk Analysis” (OSSRA) report, indicating a significant…

Dictators Used Sandvine Tech to Censor the Internet. The US Finally Did Something About It
28
Feb
2024

Dictators Used Sandvine Tech to Censor the Internet. The US Finally Did Something About It

When the Egyptian government shut down the internet in 2011 to give itself cover to crush a popular protest movement,…

Researchers Uncovers Tools And Tactics Used By Chinese Hackers
28
Feb
2024

Researchers Uncovers Tools And Tactics Used By Chinese Hackers

Over the years, several reports associated with cybercriminals have been based in Russia and Western countries. This is due to…