Chinese Cyber Attack
12
Jul
2023

Microsoft Thwarts Chinese Cyber Attack Targeting Western European Governments

Jul 12, 2023THNThreat Intel / Cyber Espionage Microsoft on Tuesday revealed that it repelled a cyber attack staged by a…

Ofcom’s online safety preparedness efforts hobbled by government
12
Jul
2023

Ofcom’s online safety preparedness efforts hobbled by government

Constant changes to the timetable and scope of the UK government’s Online Safety Bill (OSB) is hindering Ofcom’s ability to…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
12
Jul
2023

Citrix Patches Critical Vulnerability in Secure Access Client for Ubuntu

Citrix on Tuesday announced the release of patches for a critical-severity vulnerability in the Secure Access client for Ubuntu that…

less than half of SMBs use Privileged Access Management- IT Security Guru
12
Jul
2023

less than half of SMBs use Privileged Access Management- IT Security Guru

Most successful breaches involve stolen or compromised credentials that are used to escalate privileges and move laterally across a network,…

Security risks
12
Jul
2023

The Risks and Preventions of AI in Business: Safeguarding Against Potential Pitfalls

Jul 12, 2023The Hacker NewsDNS Filtering / Network Security Artificial intelligence (AI) holds immense potential for optimizing internal processes within…

12
Jul
2023

NoName Hacker Group Alleges Cyber Attacks On Lithuania

In a series of cyber attacks on media, the NoName hacker collective has targeted the online portal Alfa, owned by…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
12
Jul
2023

Microsoft Revokes Many Signed Drivers Used by Chinese Cybercriminals

After being notified by several security firms, Microsoft has revoked many signed drivers that had been leveraged by threat actors,…

12
Jul
2023

Same code, different ransomware? Leaks kick-start myriad of new variants

Threat landscape trends demonstrate the impressive flexibility of cybercriminals as they continually seek out fresh methods of attack, including exploiting…

Eticas outlines approach to ‘adversarial’ algorithmic auditing
12
Jul
2023

Microsoft users on high alert over dangerous RCE zero-day

Microsoft has disclosed a potentially serious remote code execution (RCE) zero-day under active exploitation – by a group with alleged…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
12
Jul
2023

Fortinet Patches Critical FortiOS Vulnerability Leading to Remote Code Execution

Fortinet on Tuesday announced security updates that address a critical-severity vulnerability in FortiOS and FortiProxy that could be exploited for…

Security Serious Unsung Heroes Awards 2023 have launched
12
Jul
2023

Security Serious Unsung Heroes Awards 2023 have launched

Eskenzi PR has today opened nominations for its eighth annual Security Serious Unsung Heroes Awards. The awards are all about…

12
Jul
2023

Chinese Hackers Deploy Microsoft-Signed Rootkit to Target Gaming Sector

Jul 12, 2023THNCyber Threat / Gaming Cybersecurity researchers have unearthed a novel rootkit signed by Microsoft that’s engineered to communicate…