4 fundamental questions on EASM
04
Apr
2023

4 fundamental questions on EASM

Security teams know, bug bounty hunters, and ethical hackers know it: Large attack surfaces are hard to manage.  In this…

Rockstar Games
04
Apr
2023

Rockstar fixes Red Dead Redemption 2 game broken by Windows update

Microsoft says Rockstar Games has addressed a known issue affecting its launcher, causing the Red Dead Redemption 2 (RRD2) game…

3CX Supply-Chain Attack
04
Apr
2023

Massive 3CX Supply-Chain Attack Inject Backdoor on Crypto Firms

Researchers from Kaspersky Labs uncovered a new wave of 3CX supply chain attacks targeting cryptocurrency companies to implant Gopuram. A…

ChatGPT Has a Big Privacy Problem
04
Apr
2023

ChatGPT Has a Big Privacy Problem

When OpenAI released GPT-3 in July 2020, it offered a glimpse of the data used to train the large language model….

Western Digital Network Breach - Hackers Accessed Servers
04
Apr
2023

Western Digital Network Breach – Hackers Accessed Servers

Western Digital (WD), a renowned manufacturer of Scandisk drives, has announced a data breach on its network, resulting in unauthorized…

Rorschach Ransomware
04
Apr
2023

Experts Warn of Advanced Evasion Strategies

Apr 04, 2023Ravie LakshmananEncryption / Data Safety Cybersecurity researchers have taken the wraps off a previously undocumented ransomware strain called…

National Cyber Force carrying out daily hacking operations to disrupt hostile threats
04
Apr
2023

National Cyber Force carrying out daily hacking operations to disrupt hostile threats

The UK’s newly created offensive cyber unit, the National Cyber Force (NCF), has carried out daily hacking operations to counter…

Types Of Cyber Risks Covered By Cyber Insurance
04
Apr
2023

Types Of Cyber Risks Covered By Cyber Insurance

The post-pandemic era has seen a steep rise in cyberattacks. An analysis of cyber incidents revealed a 125% increase through…

NO. 376 | AI transforms security, existential risk, and how to stay in front…
04
Apr
2023

NO. 376 | AI transforms security, existential risk, and how to stay in front…

Exploring the intersection of security, technology, and society—and what might be coming next… Standard Web Edition | April 3, 2023…

ALPHV ransomware exploits Veritas Backup Exec bugs for initial access
04
Apr
2023

ALPHV ransomware exploits Veritas Backup Exec bugs for initial access

An ALPHV/BlackCat ransomware affiliate was observed exploiting three vulnerabilities impacting the Veritas Backup product for initial access to the target network. The…

Hackers launched a DDoS Attack against CheckPoint and anticipate to target it again
04
Apr
2023

Hackers launched a DDoS Attack against CheckPoint and anticipate to target it again

Anonymous Sudan, a group of Hackers claiming to be as Palestinians, launched a distributed denial of service attack on Israel-based…

Cybersecurity
04
Apr
2023

Sorting Through Haystacks to Find CTI Needles

Clouded vision CTI systems are confronted with some major issues ranging from the size of the collection networks to their…