Samsung Mobile has issued fixes to address several security flaws discovered in Galaxy phones and tablets. In the September 2023...
Phishing campaigns are still the most effective way to hack a person, spread malware, infiltrate an organization or conduct any cybercriminal activities. Though several security measures...
White snake stealer, an info stealer which has enhanced features now able to target both Windows and Linux platforms posing a significant threat to user privacy...
Phishing attacks are online scams in which hackers pretend to represent reliable organizations to trick victims into disclosing private information like passwords or credit card numbers....
Anonymous Sudan recently announced on Telegram the sale of a valuable Microsoft user data collection with a price tag of $50,000 for the full database. The...
A Spanish-based threat actor Neo_Net has conducted campaigns against financial institutions and banks and achieved the highest success rate in spite of its unsophisticated tools. The...
Here’s a look at the most interesting products from the past month, featuring releases from: 1Password, Bitdefender, Cequence Security, ConnectSecure, Cymulate, Cytracom, Datadog, Delinea, Edgescan, Enveedo,...
As more businesses experience resource and cost constraints, 86% of MSPs and MSSPs customers are outsourcing their security needs to consolidate security tools, according to OpenText....
While surface-level confidence around hybrid cloud security is high, with 94% of global respondents stating their security tools and processes provide them with complete visibility and insights into...
In this Help Net Security video, Charl van der Walt, Head of Security Research at Orange Cyberdefense, discusses cyber extortion attacks and their expansion to new regions....
Threat actors are well-aware of the vulnerability of our cloud infrastructure. The internet we have today is not equipped to serve the data needs of the future. When...
Recent Comments