T-Mobile Breached Over 100 times by Hackers in 2022: Report
01
Mar
2023

T-Mobile Breached Over 100 times by Hackers in 2022: Report

Data analysis has revealed that more than 100 separate incidents took place in 2022, in which three cybercriminal groups gained…

Dark Web Monitoring Tools
01
Mar
2023

Top Dark Web Monitoring Tools in 2023 You Should Know About

In the depths of the internet lies a mysterious and secretive space known as the dark web. It’s where anonymity…

Twitter is down with users seeing "Welcome to Twitter" screen
01
Mar
2023

Twitter is down with users seeing “Welcome to Twitter” screen

Twitter users are currently experiencing issues worldwide, with users unable to use the website and mobile apps. When attempting to…

5 Best Video Editing SDKs for iOS
01
Mar
2023

5 Best Video Editing SDKs for iOS

Video editing SDKs are great tools for creating and launching your products much more quickly. However, picking the one that…

Covert cyberattacks on the rise as attackers shift tactics for maximum impact
01
Mar
2023

Covert cyberattacks on the rise as attackers shift tactics for maximum impact

2022 was the second-highest year on record for global ransomware attempts, as well as an 87% increase in IoT malware…

Gmail and Google Calendar Now Support Client-Side Encryption (CSE) to Boost Data Privacy
01
Mar
2023

Gmail and Google Calendar Now Support Client-Side Encryption (CSE) to Boost Data Privacy

Mar 01, 2023Ravie LakshmananEncryption / Email Security Google has announced the general availability of client-side encryption (CSE) for Gmail and…

01
Mar
2023

Tabcorp sets fresh transformation plans – Strategy

Tabcorp is transforming its entire wagering ecosystem as it targets a 30 percent digital revenue market share. The company unveiled…

LastPass becomes a cyber attack victim for the second time from the first time
01
Mar
2023

LastPass becomes a cyber attack victim for the second time from the first time

It is a well-known fact that those spreading malware like ransomware strike the same victim twice, if/when the victim shows…

5 open source Burp Suite penetration testing extensions you should check out
01
Mar
2023

5 open source Burp Suite penetration testing extensions you should check out

When it comes to assessing the security of computer systems, penetration testing tools are critical for identifying vulnerabilities that attackers…

Parallax RAT Targeting Cryptocurrency Firms with Sophisticated Injection Techniques
01
Mar
2023

Parallax RAT Targeting Cryptocurrency Firms with Sophisticated Injection Techniques

Mar 01, 2023Ravie LakshmananCryptocurrency / Cyber Attack Cryptocurrency companies are being targeted as part of a new campaign that delivers…

Hackers Use macOS Apps to Deploy Crypto Mining Software
01
Mar
2023

Hackers Use macOS Apps to Deploy Crypto Mining Software

Researchers have uncovered yet another campaign that uses macOS applications to distribute malware and launch crypto mining operations. A new…

WorkSafe Victoria hunts for new CDAO
01
Mar
2023

WorkSafe Victoria hunts for new CDAO – Strategy

Catch.com head of data and analytics Kathryn Gulifa WorkSafe Victoria is on the hunt for a new chief data and…