Category: Information

5 Tips for Improving Your Business Security

When it comes to data security, you might think of firewalls, encryption, or vulnerability scanning. However, many businesses over...

Read More

Industry Veterans and New Talent Recognised at European...

The winners of the European Cybersecurity Blogger Awards were announced at a ceremony held at Tapa Tapa, London, on the 5th June 2...

Read More

Check Point Warns of Zero-Day Attacks on its VPN Gatewa...

Check Point is warning of a zero-day vulnerability in its Network Security gateway products that threat actors have exploited in t...

Read More

Cybercriminals Abuse Stack Overflow to Promote Maliciou...

Cybersecurity researchers have warned of a new malicious Python package that has been discovered in the Python Package Index (PyPI...

Read More

U.S. Dismantles World's Largest 911 S5 Botnet with 19 M...

The U.S. Department of Justice (DoJ) on Wednesday said it dismantled what it described as "likely the world's largest botnet ever,...

Read More

Okta Warns of Credential Stuffing Attacks Targeting Cus...

Okta is warning that a cross-origin authentication feature in Customer Identity Cloud (CIC) is susceptible to credential stuffing ...

Read More

Europol Shuts Down 100+ Servers Linked to IcedID, Trick...

Europol on Thursday said it shut down the infrastructure associated with several malware loader operations such as IcedID, SystemB...

Read More

Researchers Uncover Active Exploitation of WordPress Pl...

Cybersecurity researchers have warned that multiple high-severity security vulnerabilities in WordPress plugins are being actively...

Read More

How to Build Your Autonomous SOC Strategy

Security leaders are in a tricky position trying to discern how much new AI-driven cybersecurity tools could actually benefit a se...

Read More

RedTail Crypto-Mining Malware Exploiting Palo Alto Netw...

The threat actors behind the RedTail cryptocurrency mining malware have added a recently disclosed security flaw impacting Palo Al...

Read More

FlyingYeti Exploits WinRAR Vulnerability to Deliver COO...

Cloudflare on Thursday said it took steps to disrupt a month-long phishing campaign orchestrated by a Russia-aligned threat actor ...

Read More

Cyber Espionage Alert: LilacSquid Targets IT, Energy, a...

A previously undocumented cyber espionage-focused threat actor named LilacSquid has been linked to targeted attacks spanning vario...

Read More

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here