Cybersecurity

bg
5 BCDR Oversights That Leave You Exposed to Ransomware

5 BCDR Oversights That Leave You Exposed to Ransomware

Ransomware isn’t just a buzzword; it’s one of the most dreaded challenges busine...

bg
TikTok Pixel Privacy Nightmare: A New Case Study

TikTok Pixel Privacy Nightmare: A New Case Study

Advertising on TikTok is the obvious choice for any company trying to reach a yo...

bg
New RustyAttr Malware Targets macOS Through Extended Attribute Abuse

New RustyAttr Malware Targets macOS Through Extended At...

Threat actors have been found leveraging a new technique that abuses extended at...

bg
Russian Hackers Exploit New NTLM Flaw to Deploy RAT Malware via Phishing Emails

Russian Hackers Exploit New NTLM Flaw to Deploy RAT Mal...

A newly patched security flaw impacting Windows NT LAN Manager (NTLM) was exploi...

bg
Hamas-Affiliated WIRTE Employs SameCoin Wiper in Disruptive Attacks Against Israel

Hamas-Affiliated WIRTE Employs SameCoin Wiper in Disrup...

A threat actor affiliated with Hamas has expanded its malicious cyber operations...

bg
Free Decryptor Released for BitLocker-Based ShrinkLocker Ransomware Victims

Free Decryptor Released for BitLocker-Based ShrinkLocke...

Romanian cybersecurity company Bitdefender has released a free decryptor to help...

bg
Researchers Warn of Privilege Escalation Risks in Google's Vertex AI ML Platform

Researchers Warn of Privilege Escalation Risks in Googl...

Cybersecurity researchers have disclosed two security flaws in Google's Vertex m...

bg
Master Certificate Management: Join This Webinar on Crypto Agility and Best Practices

Master Certificate Management: Join This Webinar on Cry...

In the fast-paced digital world, trust is everything—but what happens when that ...

bg
Vietnamese Hacker Group Deploys New PXA Stealer Targeting Europe and Asia

Vietnamese Hacker Group Deploys New PXA Stealer Targeti...

A Vietnamese-speaking threat actor has been linked to an information-stealing ca...

bg
How AI Is Transforming IAM and Identity Security

How AI Is Transforming IAM and Identity Security

In recent years, artificial intelligence (AI) has begun revolutionizing Identity...

Ce site utilise des cookies pour améliorer votre expérience de navigation. En continuant à utiliser ce site, vous consentez à l'utilisation de cookies. Veuillez consulter notre politique de confidentialité pour plus d'informations sur la façon dont nous traitons vos données.