Fortinet has issued an alert warning that the Gafgyt botnet malware is actively trying to exploit a vulnerability in the...
https://player.vimeo.com/video/726938963?h=b9abf9db53&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 Recently, Microsoft retired IE 11 in favor of Microsoft Edge, which claims to be more secure than Google Chrome, with built-in defenses against phishing and malware. Does...
CISA Director Jen Easterly said industry concerns shouldn’t preclude use of the commission’s regulatory authority to mitigate exploitation of the Border Gateway Protocol. The Federal Communications...
Organizations are increasingly using machine learning (ML) models in their applications and services without considering the security requirements they entail, a new study by security consultancy...
The UK’s National Cyber Security Centre (NCSC) and Information Commissioner’s Office (ICO) have released a joint letter urging the legal industry not to pay ransomware demands....
A new data extortion group has been breaching companies to steal confidential information, threatening victims to make the files publicly available unless they pay a ransom....
Microsoft says last week’s decision to roll back VBA macro auto-blocking in downloaded Office documents is only a temporary change. Redmond announced in February that Microsoft Office...
Kali Linux, the popular open source Linux distribution specialized for penetration testing, ethical hacking and security auditing, can now be used by Linode customers. Getting Kali...
Recently, Normalyze, a data-first cloud security platform, came out of stealth with $22.2M in Series A funding. This was the perfect time to catch up with co-founder...
The notorious cybercriminal syndicate competes with Conti and Lockbit 3.0. They introduced an advanced search by stolen victim’s passwords, and confidential documents leaked in the TOR...
https://player.vimeo.com/video/726721631?h=b7e8fe73dc&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 Often we see stories about cyber attacks that breached an organisations’ security parameters, and advice on how we can protect against future threats. However, what...
Recent Comments