China’s cyberspace regulator has issued revised rules to facilitate and regulate cross-border data flow, clarifying reporting standards for security assessments…
Security Affairs newsletter Round 464 by Pierluigi Paganini – INTERNATIONAL EDITION Pierluigi Paganini March 24, 2024 A new round of…
How many errors does your organization have? By Zsolt Baranya, Information Security Auditor, Black Cell Ltd. During my work as…
Cybercriminals Accelerate Online Scams During Ramadan and Eid Fitr Pierluigi Paganini March 24, 2024 During the month of Ramadan, Resecurity…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Outsmarting cybercriminal innovation with strategies…
Mar 24, 2024NewsroomArtificial Intelligence / Cyber Espionage The North Korea-linked threat actor known as Kimsuky (aka Black Banshee, Emerald Sleet,…
A client’s website was experiencing random pop-ups as server side scanner logs revealed a JavaScript injection related to Sign1, which…
Mar 24, 2024NewsroomRansomware / Threat Intelligence German authorities have announced the takedown of an illicit underground marketplace called Nemesis Market…
Amidst the anticipation of the vibrant Holi celebrations, there lurks a less colorful reality: the shadowy world of Holi scams…
By Douglas McKee, Executive Director, Threat Research, SonicWall As Ferris Bueller once said, “Life moves pretty fast.” Most people, especially…
By Chahak Mittal, GRC Manager, Universal Logistics In the ever-changing world of technology, managing end-of-life (EOL) and out-of-service (OOS) operating…
By Scott Gerlach, CSO – StackHawk The accelerated demand for software applications and application programming interfaces (APIs) across industries has…











