VMware Carbon Black Achieves 100% Malware Protection and Zero False Positives in AV-Comparatives TestAV-Comparatives recently released the latest results of the Business Security Test. Out of...
Year: 2022
Crypto-Crooks Spread Trojanized Google Translate App in Watering-Hole Attack
Crypto-Crooks Spread Trojanized Google Translate App in Watering-Hole AttackThe ongoing campaign is spreading worldwide, using the lure of a fully functional Google Translate application for desktops...
K72376285: Poppler vulnerability CVE-2017-18267
K72376285: Poppler vulnerability CVE-2017-18267Poppler vulnerability CVE-2017-18267 Security Advisory Security Advisory Description The FoFiType1C::cvtGlyph function in fofi/FoFiType1C.cc in Poppler through 0.64.0 allows remote attackers to ... More...
K70949911: Glib vulnerability CVE-2019-14822
K70949911: Glib vulnerability CVE-2019-14822Glib vulnerability CVE-2019-14822 Security Advisory Security Advisory Description A flaw was discovered in ibus in versions before 1.5.22 that allows any unprivileged user...
Crypto-Crooks Spread Trojanized Google Translate App in Watering-Hole Attack
Crypto-Crooks Spread Trojanized Google Translate App in Watering-Hole AttackThe ongoing campaign is spreading worldwide, using the lure of a fully functional Google Translate application for desktops...
Google Fixes 24 Vulnerabilities With New Chrome Update
Google Fixes 24 Vulnerabilities With New Chrome UpdateBut one issue that lets websites overwrite content on a user's system clipboard appears unfixed in the new Version...
Google Fixes 24 Vulnerabilities With New Chrome Update
Google Fixes 24 Vulnerabilities With New Chrome UpdateBut one issue that lets websites overwrite content on a user's system clipboard appears unfixed in the new Version...
Closing the Security Gap Opened by the Rise of No-Code Tools
Closing the Security Gap Opened by the Rise of No-Code ToolsNo-code startups such as Mine PrivacyOps say they offer best of both worlds — quick development...
Closing the Security Gap Opened by the Rise of No-Code Tools
Closing the Security Gap Opened by the Rise of No-Code ToolsNo-code startups such as Mine PrivacyOps say they offer best of both worlds — quick development...
Do companies have a false sense of database security?
Do companies have a false sense of database security?This month, Black Hat 2022 celebrated its 25th year and gathered thousands of security experts and executives from...
GigaOm Recognizes DTEX as the Only Outperforming Leader in 2022 Data Loss Prevention Radar Report
GigaOm Recognizes DTEX as the Only Outperforming Leader in 2022 Data Loss Prevention Radar ReportThere is nothing more gratifying in a crowded market filled with good...
Lloyd’s Backs Off Insurance for State-Sponsored Cyberattacks
Lloyd’s Backs Off Insurance for State-Sponsored CyberattacksLloyd's Backs Off Insurance for State-Sponsored Cyberattacks brooke.crothers Tue, 08/30/2022 - 15:00 22 views Cyber related businesses are ‘evolving risk’...
Tech knowledge: Parents believe their children have overtaken them
Tech knowledge: Parents believe their children have overtaken them We’ve recently conducted research that shows that over half of UK parents believe that their child is...
Updated for 2022: What is Network Traffic Analysis? A Beginner’s Guide
Updated for 2022: What is Network Traffic Analysis? A Beginner’s Guide87 percent of organizations use network traffic analysis (NTA) tools for threat detection and response according...
Dealing with a ransomware attack: How can firms spot and recover from these threats?
Dealing with a ransomware attack: How can firms spot and recover from these threats?Ransomware has been one of the biggest cybersecurity trends of the last few...
Interested in Reducing Your Risk Profile? Jamf Has a Solution for That
Interested in Reducing Your Risk Profile? Jamf Has a Solution for ThatThe threat landscape has changed dramatically over the past decade. While cybercriminals continue to look...
Google Launches New Open Source Bug Bounty to Tackle Supply Chain Attacks
Google Launches New Open Source Bug Bounty to Tackle Supply Chain AttacksGoogle on Monday introduced a new bug bounty program for its open source projects, offering...
Chinese Hackers Used ScanBox Framework in Recent Cyber Espionage Attacks
Chinese Hackers Used ScanBox Framework in Recent Cyber Espionage AttacksA months-long cyber espionage campaign undertaken by a Chinese nation-state group targeted several entities with reconnaissance malware...
Experts Find Malicious Cookie Stuffing Chrome Extensions Used by 1.4 Million Users
Experts Find Malicious Cookie Stuffing Chrome Extensions Used by 1.4 Million UsersFive imposter extensions for the Google Chrome web browser masquerading as Netflix viewers and others...
Hackers Hide Malware in Stunning Images Taken by James Webb Space Telescope
Hackers Hide Malware in Stunning Images Taken by James Webb Space TelescopeA persistent Golang-based malware campaign dubbed GO#WEBBFUSCATOR has leveraged the deep field image taken from...
Back to School: 7 Top Cybersecurity Tips at this Busy Time
Back to School: 7 Top Cybersecurity Tips at this Busy Time It’s the last week of the summer holidays, and parents, kids, teens, college students... The...
Chrome patches 24 security holes, enables “Sanitizer” safety system
Chrome patches 24 security holes, enables “Sanitizer” safety system24 existing bugs fixed. And, we hope, numerous potential future bugs prevented.Leer másNaked Security24 existing bugs fixed. And,...
Unicorn? Soonicorn? Make Sure SOX ITGC is in Your Sights | anecdotes
Unicorn? Soonicorn? Make Sure SOX ITGC is in Your Sights | anecdotesIf your company is thinking about going IPO, streamlining SOX ITGC Compliance with automation should...
LastPass: When the Password Manager Gets Owned
LastPass: When the Password Manager Gets Owned The LastPass hack currently generating media attention is distressingly common. We’re told that an “unauthorized party” was somehow able...
The Exploitation of Privileged Accounts
The Exploitation of Privileged Accounts The flow of news about data breaches and ransomware attacks is relentless. Businesses of all sizes—large companies included—continue to suffer. Not only...
Cryptominer Disguised as Google Translate Targeted 11 Countries
Cryptominer Disguised as Google Translate Targeted 11 CountriesCreated by a Turkish-speaking entity, the malware claimed around 111,000 victims in 11 countriesLeer másCreated by a Turkish-speaking entity,...
Baker & Taylor’s Systems Remain Offline a Week After Ransomware Attack
Baker & Taylor's Systems Remain Offline a Week After Ransomware AttackThe company said it will proceed to restore its systems as soon as they are sanitizedLeer...
ModernLoader Delivers Stealers, Cryptominers and RATs Via Fake Amazon Gift Cards
ModernLoader Delivers Stealers, Cryptominers and RATs Via Fake Amazon Gift CardsThe association between the three apparently unrelated campaigns was made by Cisco TalosLeer másThe association between...
ICO Pursues Traffic Accident Data Thieves
ICO Pursues Traffic Accident Data ThievesData protection regulator begins criminal proceedingsLeer másData protection regulator begins criminal proceedings
TikShock: Don’t get caught out by these 5 TikTok scams
TikShock: Don’t get caught out by these 5 TikTok scamsAre you aware of the perils of the world’s no. 1 social media? Do you know how...

























