The sophistication of cybercriminals intensifies with emerging strategies for cashing in or causing chaos
While tried and true tactics like phishing and malware are here to stay, there are always new approaches to watch out for in the cybersecurity…
While tried and true tactics like phishing and malware are here to stay, there are always new approaches to watch out for in the cybersecurity…
Ransomware is a tool that hackers use to extort money from their targets like individuals, businesses, and governments. The malware encrypts the target’s data and…
Pwn2Own Automotive 2024 takes place in Tokyo, Japan, from January 24 to 26. The Pwn2Own Automotive 2024 hacking contest, taking place in Tokyo, Japan from…
Currently, over 75% of countries worldwide use electronic documents equipped with NFC chips. Due to this fact, virtually every business has to deal with such…
Jan 25, 2024NewsroomVulnerability / Software Security The maintainers of the open-source continuous integration/continuous delivery and deployment (CI/CD) automation software Jenkins have resolved nine security flaws,…
Cisco has developed technology to help developers manage the software agents they use to monitor applications and IT infrastructure. Smart Agent for Cisco AppDynamics provides…
Predatory Sparrow is distinguished most of all by its apparent interest in sending a specific geopolitical message with its attacks, says Juan Andres Guerrero-Saade, an…
Check Point’s Live Cyber Threat Map identified 20,000 instances of QR code phishing and malware attacks within two weeks, highlighting the vulnerability of QR codes…
ESET researchers have discovered NSPX30, a sophisticated implant used by a new China-aligned APT group, which they dubbed Blackwood. Blackwood has carried out cyberespionage operations…
The year 2023 was another one characterised by uncertainty. Once again, global instability has muddied the waters, making coming up with reliable predictions almost impossible.…
All types of cyber threat actor are already using artificial intelligence (AI) to varying degrees, UK National Cyber Security Centre’s analysts say, and predict that…
A previously undocumented China-aligned threat actor has been linked to a set of adversary-in-the-middle (AitM) attacks that hijack update requests from legitimate software to deliver…