Table of Content Both the wilderness and the cyber landscape are full of surprises. Unfortunately, some of those surprises can hurt you – whether it be...
Day: March 1, 2023
Google Gmail client-side encryption is available globally
Google Gmail client-side encryption is available globallyGmail client-side encryption (CSE) is now available for Workspace Enterprise Plus, Education Plus, and Education Standard customers. Google announced that...
LastPass Confirms Second Data Breach of Encrypted Password Vaults
LastPass Confirms Second Data Breach of Encrypted Password VaultsAs a result of another attack on LastPass’s systems, the company disclosed a severe data breach in December...
What Is Broken Access Control and How to Keep Your Organization Safe?
What Is Broken Access Control and How to Keep Your Organization Safe?Access control is an important security measure for organizations of all sizes. Without it, intruders...
Scarleteel Cloud Attack: Hackers Use Kubernetes and AWS to Steal Source Code
Scarleteel Cloud Attack: Hackers Use Kubernetes and AWS to Steal Source CodeThreat actors exploited a compromised Kubernetes container to attempt privilege escalation into an AWS account....
ChromeLoader Malware Is Targeting Gamers
ChromeLoader Malware Is Targeting GamersCybersecurity researchers recently discovered a new wave of ChromeLoader malware that threat actors are using to circumvent antivirus software and other cybersecurity...
Crypto-Ransomware: An A to Z Guide to What It Is and How to Protect Yourself
Crypto-Ransomware: An A to Z Guide to What It Is and How to Protect YourselfWondering what is crypto-ransomware? You’ve come to the right place. Because of...
Fooling a Voice Authentication System with an AI-Generated Voice
Fooling a Voice Authentication System with an AI-Generated VoiceA reporter used an AI synthesis of his own voice to fool the voice authentication system for Lloyd’s...
8 ways to secure Chrome browser for Google Workspace users
8 ways to secure Chrome browser for Google Workspace usersPosted by Kiran Nair, Product Manager, Chrome Browser Your journey towards keeping your Google Workspace users and...
Iron Tiger’s SysUpdate Reappears, Adds Linux Targeting
Iron Tiger’s SysUpdate Reappears, Adds Linux TargetingWe detail the update that advanced persistent threat (APT) group Iron Tiger made on the custom malware family SysUpdate. In...
Twitter is down with users seeing “Welcome to Twitter” screen
Twitter is down with users seeing "Welcome to Twitter" screenWhen attempting to access Twitter's website, users see "Welcome to Twitter!" on the timeline. The alert, typically used...
How to Prevent Callback Phishing Attacks on Your Organization
How to Prevent Callback Phishing Attacks on Your OrganizationHybrid phishing attacks continue to pose a clear and present danger to all organizations. How can these threats...