Migrating to the cloud: An overview of process and strategy
05
Feb
2024

Migrating to the cloud: An overview of process and strategy

Over the next few years, the number of organizations navigating to the cloud to advance their business goals is expected…

week in security
05
Feb
2024

A week in security (January 29 – February 4)

February 2, 2024 – CISA has ordered all FCEB agencies to disconnect all instances of Ivanti Connect Secure and Ivanti…

iPhones
05
Feb
2024

Pegasus Spyware Targeted iPhones of Journalists and Activists in Jordan

Feb 05, 2024NewsroomSpyware / Surveillance The iPhones belonging to nearly three dozen journalists, activists, human rights lawyers, and civil society…

IT security strategy: Assessing the risks of generative AI
05
Feb
2024

IT security strategy: Assessing the risks of generative AI

IT security leaders are recognising the risks and opportunities of generative artificial intelligence (GenAI) for enterprise IT. In April 2023,…

Snatch Ransomware Group Claims The FDVA Cyber Attack
05
Feb
2024

Decoding The Cloudflare Cyberattack: Here’s What Happened?

The impact of the massive Okta data breach lingers, continuing to provide an opportunistic terrain for hackers. Cloudflare, a prominent…

Software firm AnyDesk disclosed a security breach
05
Feb
2024

Software firm AnyDesk disclosed a security breach

Software firm AnyDesk disclosed a security breach Pierluigi Paganini February 05, 2024 Remote desktop software company AnyDesk announced that threat…

AnyDesk hit by ransomware and Cloudflare hacked
05
Feb
2024

AnyDesk hit by ransomware and Cloudflare hacked

AnyDesk, a widely-used platform for remote access software, fell victim to a ransomware attack, exposing its source code and private…

Researchers discover exposed API secrets, impacting major tech tokens
05
Feb
2024

Researchers discover exposed API secrets, impacting major tech tokens

Escape’s security research team scanned 189.5 million URLs and found more than 18,000 exposed API secrets. 41% of exposed secrets…

Commando Cat Attacking Docker Endpoints to Install Crypto Miners
05
Feb
2024

Commando Cat Attacking Docker Endpoints to Install Crypto Miners

A recent malware campaign dubbed “Commando Cat” has set its sights on exposed Docker API endpoints, posing a significant threat…

Webinar
05
Feb
2024

Hackers Using 130,000+ Domains for Cyber Attacks

A new large-scale campaign named “ApateWeb ” has been discovered, which uses over 130,000 domains to deliver scareware, potentially unwanted…

Unraveling the Differences: Hashing, Salting, and Encryption Explained
05
Feb
2024

Unraveling the Differences: Hashing, Salting, and Encryption Explained

In the realm of cybersecurity, understanding the nuances between hashing, salting, and encryption is crucial for safeguarding sensitive data. Each…

Latio Application Security Tester: Use AI to scan your code
05
Feb
2024

Latio Application Security Tester: Use AI to scan your code

Latio Application Security Tester is an open-source tool that enables the usage of OpenAI to scan code from the CLI…