Cybersecurity

bg
Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT Malware

Cybercriminals Use Excel Exploit to Spread Fileless Rem...

Cybersecurity researchers have discovered a new phishing campaign that spreads a...

bg
9 Steps to Get CTEM on Your 2025 Budgetary Radar

9 Steps to Get CTEM on Your 2025 Budgetary Radar

Budget season is upon us, and everyone in your organization is vying for their s...

bg
INTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime

INTERPOL Disrupts Over 22,000 Malicious Servers in Glob...

INTERPOL on Tuesday said it took down more than 22,000 malicious servers linked ...

bg
South Korea Fines Meta $15.67M for Illegally Sharing Sensitive User Data with Advertisers

South Korea Fines Meta $15.67M for Illegally Sharing Se...

Meta has been fined 21.62 billion won ($15.67 million) by South Korea's data pri...

bg
Google Cloud to Enforce Multi-Factor Authentication by 2025 for All Users

Google Cloud to Enforce Multi-Factor Authentication by ...

Google's cloud division has announced that it will enforce mandatory multi-facto...

bg
Canadian Suspect Arrested Over Snowflake Customer Breach and Extortion Attacks

Canadian Suspect Arrested Over Snowflake Customer Breac...

Canadian law enforcement authorities have arrested an individual who is suspecte...

bg
New Winos 4.0 Malware Infects Gamers Through Malicious Game Optimization Apps

New Winos 4.0 Malware Infects Gamers Through Malicious ...

Cybersecurity researchers are warning that a command-and-control (C&C) framework...

bg
FBI Seeks Public Help to Identify Chinese Hackers Behind Global Cyber Intrusions

FBI Seeks Public Help to Identify Chinese Hackers Behin...

The U.S. Federal Bureau of Investigation (FBI) has sought assistance from the pu...

bg
New Android Banking Malware 'ToxicPanda' Targets Users with Fraudulent Money Transfers

New Android Banking Malware 'ToxicPanda' Targets Users ...

Over 1,500 Android devices have been infected by a new strain of Android banking...

bg
Leveraging Wazuh for Zero Trust security

Leveraging Wazuh for Zero Trust security

Zero Trust security changes how organizations handle security by doing away with...

Ce site utilise des cookies pour améliorer votre expérience de navigation. En continuant à utiliser ce site, vous consentez à l'utilisation de cookies. Veuillez consulter notre politique de confidentialité pour plus d'informations sur la façon dont nous traitons vos données.