Hacking gang leaks documents stolen from Pentagon IT provider
Hackers have released internal documents stolen from one of America’s largest IT services providers, which counts various US government agencies,
Continue readingHackers have released internal documents stolen from one of America’s largest IT services providers, which counts various US government agencies,
Continue readingSecurity researchers have shed light on a new iteration of Mandrake, a sophisticated Android cyber-espionage malware tool. Initially analyzed by
Continue readingAn unknown PowerShell backdoor has been discovered alongside a new variant of the Zloader/SilentNight malware, Walmart’s Cyber Intelligence Team has
Continue readingAn unknown threat actor has been linked to a massive scam campaign that exploited an email routing misconfiguration in email
Continue readingSecurity researchers have unveiled critical vulnerabilities within web analytics provider Hotjar and global news outlet Business Insider. The findings, from
Continue readingIdeally, such privileged access should be governed stringently, ensuring adequately tested, digitally signed software with limited privileges is used,” Varkey
Continue readingSearchable Encryption has long been a mystery. An oxymoron. An unattainable dream of cybersecurity professionals everywhere. Organizations know they must
Continue readingOther vendors aren’t immune It would be naive to think of a world free of CrowdStrike-like scenarios, especially in the
Continue readingEuropean businesses have been urged to carefully assess what privacy, security and acceptable usage controls they need to place on
Continue readingA US-headquartered cryptocurrency exchange has revealed a supply chain breach which led to the compromise of personal and banking information
Continue reading