Subscribe to Updates
Subscribe to our newsletter and be the first to access exclusive content and expert insights.
Browsing: computer security
Microsoft Defender Vulnerability Exploited to Deliver ACR, Lumma, and Meduza Stealing Malware
July 24, 2024NewsroomMalvertising/Threat Intelligence A now-fixed security flaw in Microsoft Defender SmartScreen was exploited as part of a new campaign designed to deliver information-stealing malware, including…
July 23, 2024NewsroomCyber Espionage/Malware The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a spear-phishing attack targeting the country’s scientific research institutions using malware…
Meta has been given until September 1, 2024 to address concerns raised by the European Commission about its “pay-or-agree” advertising model and the risk of enforcement…
July 23, 2024NewsroomCyber Espionage / Chinese Hackers Taiwanese organizations and US non-governmental organizations (NGOs) based in China have been targeted by state-sponsored hacker groups with ties…
July 23, 2024NewsroomThreat Detection/Website Security Threat actors have been observed using swap files on compromised websites to hide persistent credit card skimmers and collect payment information.…
July 23, 2024NewsroomICS Malware / Critical Infrastructure Cybersecurity researchers have discovered a ninth piece of malware targeting industrial control systems (ICS), which was used in a…
July 23, 2024Hacker NewsCorporate Security/Data Protection The initial onboarding stage is a critical step for both employees and employers. However, this process often involves the practice…
July 23, 2024NewsroomOnline Privacy/Regulatory Compliance Google on Monday abandoned plans to phase out third-party tracking cookies in its Chrome web browser, more than four years after…
A vCISO is responsible for the cybersecurity strategy and risk management of their client, which includes multiple disciplines from investigation to execution to reporting. We recently…
The various TDS and DNS relationships associated with Vigorish Viper and the final landing experience of users Chinese organized crime syndicates involved in money laundering and…