Cybersecurity, why a hotline number could be important
09
Feb
2024

26 Cyber Security Stats Every User Should Be Aware Of in 2024

26 Cyber Security Stats Every User Should Be Aware Of in 2024 Pierluigi Paganini February 09, 2024 26 key cyber…

Webinar
09
Feb
2024

Researchers Use Raspberry Pi Pico to Crack BitLocker

BitLocker is a computer program provided by Microsoft that users can use to encrypt their entire volumes, preventing unauthorized access…

France data breach triggers among half of the populace
09
Feb
2024

France data breach triggers among half of the populace

A significant cyber-attack has rocked France, with data from over 33 million individuals—roughly half of the country’s population—falling victim to…

February 2024 Patch Tuesday forecast: Zero days are back and a new server too
09
Feb
2024

February 2024 Patch Tuesday forecast: Zero days are back and a new server too

January 2024 Patch Tuesday is behind us. A relatively light release from Microsoft with 39 CVEs addressed in Windows 10,…

Original Footwear Cyberattack, LockBit Claims Responsibility
09
Feb
2024

Original Footwear Cyberattack, LockBit Claims Responsibility

Original Footwear, a popular American boots maker catering to law enforcement, military, and other professionals, found itself in the spotlight…

Cyberattacks on Indonesia
09
Feb
2024

Millions Of Data On Sale

The threat actors have purportedly put up for sale vast amounts of sensitive data pertaining to Indonesian citizens and institutions….

Ransomware Payments Hitting Record High, Exceed $1 Billion
09
Feb
2024

Ransomware Payments Hitting Record High, Exceed $1 Billion

Chainalysis, a leading blockchain analysis firm, has recently released a report on ransomware payments revealing that they have skyrocketed to…

Enhancing Application Code Security: Best Practices and Strategies
09
Feb
2024

Enhancing Application Code Security: Best Practices and Strategies

In today’s digital landscape, the security of application code is paramount to protect sensitive data, prevent unauthorized access, and safeguard…

Key strategies for ISO 27001 compliance adoption
09
Feb
2024

Key strategies for ISO 27001 compliance adoption

In this Help Net Security interview, Robin Long, founder of Kiowa Security, shares insights on how best to approach the…

Critical FortiOS SSL VPN Vulnerability
09
Feb
2024

Fortinet Warns of Critical FortiOS SSL VPN Vulnerability Under Active Exploitation

Feb 09, 2024NewsroomZero Day Vulnerability / Network Security Fortinet has disclosed a new critical security flaw in FortiOS SSL VPN…

LastPass
09
Feb
2024

Fake LastPass password manager spotted on Apple’s App Store

LastPass is warning that a fake copy of its app is being distributed on the Apple App Store, likely used…

How AI is revolutionizing identity fraud
09
Feb
2024

How AI is revolutionizing identity fraud

Nearly half of businesses reported a growth in synthetic identity fraud, while biometric spoofs and counterfeit ID fraud attempts also…