No menu items!
No menu items!
More

    News

    New Research Warns About Weak Offboarding Management and Insider Risks

    A recent study by Wing Security found that 63% of businesses may have former employees with access to organizational data, and that automating...

    U.S. Sentences 31-Year-Old to 10 Years for Laundering $4.5M in Email Scams

    May 29, 2024NewsroomCybercrime / Cybersecurity The U.S. Department of Justice (DoJ) has sentenced a 31-year-old to 10 years in prison for laundering more than...

    Microsoft Uncovers ‘Moonstone Sleet’ — New North Korean Hacker Group

    A never-before-seen North Korean threat actor codenamed Moonstone Sleet has been attributed as behind cyber attacks targeting individuals and organizations in the software...

    BreachForums Returns Just Weeks After FBI Seizure

    May 29, 2024NewsroomCyber Crime / Data Breach The online criminal bazaar BreachForums has been resurrected merely two weeks after a U.S.-led coordinated law enforcement...

    Indian National Pleads Guilty to $37 Million Cryptocurrency Theft Scheme

    An Indian national has pleaded guilty in the U.S. over charges of stealing more than $37 million by setting up a website that...

    Researchers Warn of CatDDoS Botnet and DNSBomb DDoS Attack Technique

    The threat actors behind the CatDDoS malware botnet have exploited over 80 known security flaws in various software over the past three months...

    4-Step Approach to Mapping and Securing Your Organization’s Most Critical Assets

    You're probably familiar with the term "critical assets". These are the technology assets within your company's IT infrastructure that are essential to the functioning...

    TP-Link Gaming Router Vulnerability Exposes Users to Remote Code Attacks

    May 28, 2024NewsroomVulnerability / Network Security A maximum-severity security flaw has been disclosed in the TP-Link Archer C5400X gaming router that could lead to...

    WordPress Plugin Exploited to Steal Credit Card Data from E-commerce Sites

    May 28, 2024NewsroomData Protection / Skimming Unknown threat actors are abusing lesser-known code snippet plugins for WordPress to insert malicious PHP code in victim...

    Latest articles

    spot_imgspot_img