No menu items!
No menu items!
More

    News

    Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks

    Apr 09, 2024NewsroomBotnet / Vulnerability Threat actors are actively scanning and exploiting a pair of security flaws that are said to affect as many...

    Google Chrome Adds V8 Sandbox

    Apr 08, 2024NewsroomSoftware Security / Cybersecurity Google has announced support for what's called a V8 Sandbox in the Chrome web browser in an effort...

    The Drop in Ransomware Attacks in 2024 and What it Means

    The ransomware industry surged in 2023 as it saw an alarming 55.5% increase in victims worldwide, reaching a staggering 5,070. But 2024 is...

    Watch Out for ‘Latrodectus’ – This Malware Could Be In Your Inbox

    Apr 08, 2024NewsroomCybercrime / Network Security Threat hunters have discovered a new malware called Latrodectus that has been distributed as part of email phishing...

    Cybercriminals Targeting Latin America with Sophisticated Phishing Scheme

    Apr 08, 2024NewsroomCybersecurity / Malvertising A new phishing campaign has set its eyes on the Latin American region to deliver malicious payloads to Windows...

    Google Sues App Developers Over Fake Crypto Investment App Scam

    Apr 08, 2024NewsroomInvestment Scam / Mobile Security Google has filed a lawsuit against two app developers for engaging in an "international online consumer investment...

    Hackers Exploit Magento Bug to Steal Payment Data from E-commerce Websites

    Apr 06, 2024NewsroomSkimmer / Threat Intelligence Threat actors have been found exploiting a critical flaw in Magento to inject a persistent backdoor into e-commerce...

    AI-as-a-Service Providers Vulnerable to PrivEsc and Cross-Tenant Attacks

    Apr 05, 2024NewsroomArtificial Intelligence / Supply Chain Attack New research has found that artificial intelligence (AI)-as-a-service providers such as Hugging Face are susceptible to...

    CISO Perspectives on Complying with Cybersecurity Regulations

    Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of compliance frameworks and the...

    Latest articles

    spot_imgspot_img