Banking Trojan apocalypse: how hackers are stealing millionsA guide to what Trojan malware is and why you should guard against this dangerous threat vectorLeer másCategories RSS...
How does CISO strategy prevent threats?
How does CISO strategy prevent threats?Explore about the challenges CISO was facing to protect the organization and how they overcome this with strategies to prevent threats.Leer...
How to foster secure and efficient data practices
How to foster secure and efficient data practicesDiscover how to apply secure file transfer practices without affecting the efficiency of your businessLeer másCategories RSS FeedDiscover how...
Cybercriminals are using ChatGPT to create malware
Cybercriminals are using ChatGPT to create malwareHow malicious parties are using AI chatbots to help power cyber crimeLeer másCategories RSS FeedHow malicious parties are using AI...
IOTW: Malicious actors gain access to GitHub source code
IOTW: Malicious actors gain access to GitHub source codeA hacker has cloned repositories associated with multiple GitHub-owned organizationsLeer másCategories RSS FeedA hacker has cloned repositories associated...
The dangerous vulnerabilities caused by weak email security
The dangerous vulnerabilities caused by weak email securityWhy email security is integral to protecting your internal business and external brand and how to improve itLeer másCategories...
What is business email compromise?
What is business email compromise?Cyber Security Hub investigates a threat vector that specifically targets employees via their emailLeer másCategories RSS FeedCyber Security Hub investigates a threat...
The ultimate guide to malware
The ultimate guide to malwareThis all-encompassing guide explores what malware is, how attacks using this dangerous threat vector are launched and how to mitigate themLeer másCategories...
Google suspends Pinduoduo app over malware concerns
Google suspends Pinduoduo app over malware concernsThe app has been suspended for failing to be compliant with Google’s policyLeer másCategories RSS FeedThe app has been suspended...
IOTW: Source code stolen in Reddit phishing attack
IOTW: Source code stolen in Reddit phishing attackCompromised employee credentials allowed the hacker to access Reddit’s internal documentsLeer másCategories RSS FeedCompromised employee credentials allowed the hacker...
We are less than a year away from a cyber attack credited to ChatGPT
We are less than a year away from a cyber attack credited to ChatGPTDirector of sales engineering APJ at BlackBerry Cybersecurity, Jonathan Jackson, explains why artificial...
IOTW: Russian hackers target NATO sites with DDoS attack
IOTW: Russian hackers target NATO sites with DDoS attackThe cyber attack has reportedly affected NATOs response to the recent earthquakes affecting Syria and TurkeyLeer másCategories RSS...
German airports hit with DDoS attack
German airports hit with DDoS attackThe suspected attack took the websites of seven airports offlineLeer másCategories RSS FeedThe suspected attack took the websites of seven airports...
How Covid-19 impacted cyber security challenges, focus and spends
How Covid-19 impacted cyber security challenges, focus and spendsPractitioner insight on how cyber security challenges, focus and spend was affected by the global pandemicLeer másCategories RSS...
Top seven hacks and cyber security threats in APAC
Top seven hacks and cyber security threats in APACCyber Security Hub explores some of the most impactful cyber attacks in the APAC regionLeer másCategories RSS FeedCyber...
Why healthcare providers are focusing on cyber resilience
Why healthcare providers are focusing on cyber resilienceCyber Security Hub interviews Jojo Nufable, group IT infrastructure and cyber security head at Metro Pacific Health Solutions, to...
IOTW: US Marshals Service suffers ransomware attack
IOTW: US Marshals Service suffers ransomware attackThe cyber attack saw confidential information held by the law enforcement office compromisedLeer másCategories RSS FeedThe cyber attack saw confidential...
What are DDoS attacks?
What are DDoS attacks?Cyber Security Hub explores how and why malicious actors launch DDoS attacksLeer másCategories RSS FeedCyber Security Hub explores how and why malicious actors...
IOTW: Ransomware gang allegedly hacks Ring doorbells
IOTW: Ransomware gang allegedly hacks Ring doorbellsAmazon has not yet confirmed that allegations of a data breach are trueLeer másCategories RSS FeedAmazon has not yet confirmed...
What is phishing?
What is phishing?Cyber Security Hub explores what phishing attacks are, why they are launched and how companies can protect themselves against themLeer másCategories RSS FeedCyber Security...
IOTW: BreachForums shuts down after FBI arrests its top admin
IOTW: BreachForums shuts down after FBI arrests its top adminBreachForums, a dark web hacking forum, has been shut down following the arrest of its top administratorLeer...
In Memoriam – Gordon Moore, who put the more in “Moore’s Law”
In Memoriam – Gordon Moore, who put the more in “Moore’s Law”His prediction was called a "Law", though it was an exhortation to engineering excellence as...
USENIX Security ’22 – Hongbin Liu, Jinyuan Jia, Neil Zhenqiang Gong – ‘PoisonedEncoder: Poisoning The Unlabeled Pre-Training Data In Contrastive Learning’
USENIX Security ’22 – Hongbin Liu, Jinyuan Jia, Neil Zhenqiang Gong – ‘PoisonedEncoder: Poisoning The Unlabeled Pre-Training Data In Contrastive Learning’Our thanks to USENIX for publishing...
? Lit + WebR + Observable Plot: Linking Lit’s Lightweight Web Components And WebR For Vanilla JS Reactivity & JS DataVis
? Lit + WebR + Observable Plot: Linking Lit’s Lightweight Web Components And WebR For Vanilla JS Reactivity & JS DataVisSee it live before reading! The...
OpenAI: A Redis bug caused a recent ChatGPT data exposure incident
OpenAI: A Redis bug caused a recent ChatGPT data exposure incidentOpenAI revealed that a Redis bug was the root cause of the recent exposure of users’...
Zero Trust in a DevOps World
Zero Trust in a DevOps WorldBy Joel Krooswyk, Federal CTO, GitLab Inc. Although zero trust may seem like an overused buzzword, the approach is critical to...
FBI: Business email compromise tactics used to defraud U.S. vendors
FBI: Business email compromise tactics used to defraud U.S. vendorsThe Federal Bureau of Investigation is warning companies in the U.S. of threat actors using tactics similar...
Cisco IOS XE Software for Cisco Catalyst 9300 Series Switches Secure Boot Bypass Vulnerability
Cisco IOS XE Software for Cisco Catalyst 9300 Series Switches Secure Boot Bypass VulnerabilityA vulnerability in Cisco IOS XE Software for Cisco Catalyst 9300 Series Switches...
Cisco Adaptive Security Appliance Software, Firepower Threat Defense Software, IOS Software, and IOS XE Software IPv6 DHCP (DHCPv6) Client Denial of Service Vulnerability
Cisco Adaptive Security Appliance Software, Firepower Threat Defense Software, IOS Software, and IOS XE Software IPv6 DHCP (DHCPv6) Client Denial of Service VulnerabilityA vulnerability in the...
Latitude Financial cyber-attack worse than first thought with 14m customer records stolen
Latitude Financial cyber-attack worse than first thought with 14m customer records stolenConsumer lender says details taken include 7.9m driver’s licence numbers and 53,000 passport numbers Follow...




























