Browsing Category
Cybersecurity
Webworm Attackers Deploy Modified RATs in Espionage Attacks
The threat actor known as Webworm has been linked to several Windows–based remote access Trojans, suggests a new advisory by…
Notepad++ Plugins Allow Attackers to Infiltrate Systems, Achieve…
Threat actors may abuse Notepad++ plugins to circumvent security mechanisms and achieve persistence on their victim machine, new…
YouTube Users Targeted By RedLine Self-Spreading Stealer
Threat actors have conducted a campaign relying on the RedLine stealer and targeting YouTube users.
The news comes from…
New Research Reveals Network Attacks at Highest Point Over the Last Three…
By Corey Nachreiner, Chief Security Officer, WatchGuard Technologies
Cybersecurity threats continue to grow every year, with…
User Alert as Phishing Campaigns Exploit Queen’s Death
Threat actors are using the death of Queen Elizabeth II as a lure to phish for users’ Microsoft credentials, experts have warned.…
Cybercrime Forum Admins Steal from Site Users
Security researchers have uncovered evidence of administrators on cybercrime forums scamming their own customers.
Threat…
Cybercrime Fears for Children as Cost-of-Living Bites
Two-fifths (40%) of UK parents believe their children may turn to cybercrime because of the surging cost of living, according to a…
ISACA: Ensuring Digital Trust Key to Digital Transformation Success
Digital trust must be a top priority for the benefits of digital transformation programs to be fully realized.
ISACA’s State of…
Federal Progress On Zero Trust: A Report
Federal Agencies are Making Progress on Zero Trust but Challenges Remain
By Dr. Matthew McFadden, Vice President, Cyber, General…
Vulnerabilities Found in Airplane WiFi Devices, Passengers’ Data…
Two critical vulnerabilities were found in wireless LAN devices that are allegedly used to provide internet connectivity in…