Dec 16, 2024Ravie LakshmananMalvertising / Threat Intelligence Cybersecurity researchers have shed light on a previously undocumented aspect a...
Author: admin
Dec 16, 2024Ravie LakshmananCyber Threats / Weekly Recap This past week has been packed with unsettling developments in the world of cybersecu...
Artificial Intelligence & Machine Learning , Recruitment & Reskilling Strategy , Training & Security Leadership Brett Barton of Unis...
Dec 16, 2024Ravie LakshmananSpyware / Surveillance A Serbian journalist had his phone first unlocked by a Cellebrite tool and subsequently com...
Cybersecurity researchers have discovered a new PHP-based backdoor called Glutton that has been put to use in cyber attacks targeting China, the...
With the evolution of modern software development, CI/CD pipeline governance has emerged as a critical factor in maintaining both agility and co...
Dec 16, 2024Ravie LakshmananCryptocurrency / Phishing Attack Cybersecurity researchers are calling attention to a new kind of investment scam ...
Dec 16, 2024Ravie LakshmananCyber Attack / Cyber Espionage The Security Service of Ukraine (SBU or SSU) has exposed a novel espionage campaign...
Dec 14, 2024Ravie LakshmananBotnet / Ad Fraud Germany's Federal Office of Information Security (BSI) has announced that it has disrupted a mal...
Dec 14, 2024Ravie LakshmananMalware / Cyber Threat Thai government officials have emerged as the target of a new campaign that leverages a tec...