Popular Dragon Touch Tablet for Kids Infected with Corejava Malware
20
Nov
2023

Popular Dragon Touch Tablet for Kids Infected with Corejava Malware

The Dragon Touch KidzPad Y88X 10 tablet on Amazon, analyzed by EFF researchers, also comes with preinstalled riskware and an…

Johnson Controls
20
Nov
2023

Johnson Controls Patches Critical Vulnerability in Industrial Refrigeration Products

Johnson Controls recently announced patches for a critical vulnerability found by an external researcher in some of its industrial refrigeration…

Hackers Exploit Google Workspace to Exfiltrate Data
20
Nov
2023

Hackers Exploit Google Workspace to Exfiltrate Data

Recent research into Google Workspace and Google Cloud Platform by Bitdefender Labs reveals novel attack methods, potentially leading to network-wide…

Former OpenAI boss to lead Microsoft Advanced AI division
20
Nov
2023

Former OpenAI boss to lead Microsoft Advanced AI division

Microsoft has hired OpenAI co-founder Sam Altman less than 36 hours after he stepped down as CEO of the ChatGPT…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
20
Nov
2023

Yamaha Motor Confirms Data Breach Following Ransomware Attack

The personal information of employees was stolen in a ransomware attack targeting a Philippines subsidiary of Yamaha Motor. The incident,…

LummaC2 Malware
20
Nov
2023

LummaC2 Malware Deploys New Trigonometry-Based Anti-Sandbox Technique

Nov 20, 2023NewsroomMalware / Cyber Attack The stealer malware known as LummaC2 (aka Lumma Stealer) now features a new anti-sandbox…

Deep Packet Inspection
20
Nov
2023

5 Steps to Assessing Risk Profiles of Third-Party SSE Platforms

Shifting the approach to cybersecurity from multi-vendor security tools sprawl to a converged Secure Services Edge (SSE) model with a…

Recognising Scam Patterns and Preventing Data Loss: A Unified Approach
20
Nov
2023

Recognising Scam Patterns and Preventing Data Loss: A Unified Approach

Cybersecurity professionals stand on the frontlines, ever-vigilant against an increasing tide of cyber threats. From protecting sensitive corporate data to…

Kubernetes Security on AWS
20
Nov
2023

Open Detection System Uncover SIEM Blind Points

Cyberattacks pose a significant risk, and prevention alone isn’t enough, so timely detection is crucial. That’s why most organizations use…

Hacker Mindset
20
Nov
2023

Why Defenders Should Embrace a Hacker Mindset

Today’s security leaders must manage a constantly evolving attack surface and a dynamic threat environment due to interconnected devices, cloud…

Enterprise beams up GenAI and consumer UX to make key applications fly
20
Nov
2023

Enterprise beams up GenAI and consumer UX to make key applications fly

The bizarre interview between Elon Musk and Rishi Sunak at the UK government’s AI Safety Summit earlier this month did…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
20
Nov
2023

Russia’s LitterDrifter USB Worm Spreads Beyond Ukraine

A recently identified USB worm attributed to the Russia-linked advanced persistent threat (APT) group Gamaredon appears to have spread beyond…