US disrupts hacking campaign targeting critical infrastructure
01
Feb
2024

US disrupts hacking campaign targeting critical infrastructure – Security

US officials said they disrupted a sweeping Chinese cyber-spying operation that targeted critical American infrastructure entities and could be used…

Android
01
Feb
2024

Exploit released for Android local elevation flaw impacting 7 OEMs

A proof-of-concept (PoC) exploit for a local privilege elevation flaw impacting at least seven Android original equipment manufacturers (OEMs) is…

Securing Your SaaS Landscape: Closer Look at Disaster Recovery, Posture Management
31
Jan
2024

Closer Look at Disaster Recovery, Posture Management

Imagine you’re on a boat, navigating through the ever-changing waters of the tech world. SaaS applications are like the currents…

Gov agencies need to have a CISO
31
Jan
2024

Home Affairs elevates CIO to group manager – Training & Development

Home Affairs’ long-time CIO Radi Kovacevic has been elevated to lead the technology and major capability group on an acting…

US CISA added critical Apache RocketMQ flaw to its Known Exploited Vulnerabilities catalog
31
Jan
2024

CISA adds Apple improper authentication bug to its Known Exploited Vulnerabilities catalog

CISA adds Apple improper authentication bug to its Known Exploited Vulnerabilities catalog Pierluigi Paganini January 31, 2024 U.S. Cybersecurity and…

Computer head guy holding his hands up
31
Jan
2024

Europcar denies data breach of 50 million users, says data is fake

Car rental company Europcar says it has not suffered a data breach and that shared customer data is fake after…

Ivanti VPN Flaws Exploited to Spread KrustyLoader Malware
31
Jan
2024

Ivanti VPN Flaws Exploited to Spread KrustyLoader Malware

Hackers exploit zero-day vulnerabilities in Ivanti VPN, deploying malware and cryptocurrency miners, with targets including Fortune 500 firms, gov’t agencies,…

Real-Life Case Study of How a $10B Enterprise Regained Control to Keep SaaS Data Secure
31
Jan
2024

Real-Life Case Study of How a $10B Enterprise Regained Control to Keep SaaS Data Secure

31 Jan The Spiraling SaaS Stack: Real-Life Case Study of How a $10B Enterprise Regained Control to Keep SaaS Data…

whispering secrets
31
Jan
2024

ChatGPT accused of breaking data protection rules

Italy’s Data Protection Authority (GPDP) has uncovered data privacy violations related to collecting personal data and age protections after an…

FBI
31
Jan
2024

FBI disrupts Chinese botnet by wiping malware from infected routers

The FBI has disrupted the KV Botnet used by Chinese Volt Typhoon state hackers to evade detection during attacks targeting…

Cyqur Launches A Game-Changing Data Encryption and Fragmentation Web Extension
31
Jan
2024

Change Your Password Day: Navigating the Shift Towards a Passwordless Future

The growth of our digital footprints has resulted in concerns about online identity security. Traditional passwords systems have become outdated,…

A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logs
31
Jan
2024

A zero-day vulnerability (and PoC) to blind defenses relying on Windows event logs

A zero-day vulnerability that, when triggered, could crash the Windows Event Log service on all supported (and some legacy) versions…