No menu items!
No menu items!
More

    THN

    Microsoft Defender Flaw Exploited to Deliver ACR, Lumma, and Meduza Stealers

    Jul 24, 2024NewsroomMalvertising / Threat Intelligence A now-patched security flaw in the Microsoft Defender SmartScreen has been exploited as part of a new campaign...

    Ukrainian Institutions Targeted Using HATVIBE and CHERRYSPY Malware

    Jul 23, 2024NewsroomCyber Espionage / Malware The Computer Emergency Response Team of Ukraine (CERT-UA) has alerted of a spear-phishing campaign targeting a scientific research...

    Meta Given Deadline to Address E.U. Concerns Over ‘Pay or Consent’ Model

    Meta has been given time till September 1, 2024, to respond to concerns raised by the European Commission over its "pay or consent"...

    Magento Sites Targeted with Sneaky Credit Card Skimmer via Swap Files

    Jul 23, 2024NewsroomThreat Detection / Website Security Threat actors have been observed using swap files in compromised websites to conceal a persistent credit card...

    How to Securely Onboard New Employees Without Sharing Temporary Passwords

    Jul 23, 2024The Hacker NewsCorporate Security / Data Protection The initial onboarding stage is a crucial step for both employees and employers. However, this...

    New ICS Malware ‘FrostyGoop’ Targeting Critical Infrastructure

    Jul 23, 2024NewsroomICS Malware / Critical Infrastructure Cybersecurity researchers have discovered what they say is the ninth Industrial Control Systems (ICS)-focused malware that has...

    Chinese Hackers Target Taiwan and US NGO with MgBot Malware

    Jul 23, 2024NewsroomCyber Espionage / Chinese Hackers Organizations in Taiwan and a U.S. non-governmental organization (NGO) based in China have been targeted by a...

    Google Abandons Plan to Phase Out Third-Party Cookies in Chrome

    Jul 23, 2024NewsroomOnline Privacy / Regulatory Compliance Google on Monday abandoned plans to phase out third-party tracking cookies in its Chrome web browser more...

    How to Increase Engagement with Your Cybersecurity Clients Through vCISO Reporting

    As a vCISO, you are responsible for your client's cybersecurity strategy and risk governance. This incorporates multiple disciplines, from research to execution to...

    Latest articles

    spot_imgspot_img