News

  • Hack the Pentagon website promotes the benefits of bug bounties to US Military

    PRIVACY PRIVACY My guess is that if you stumbled across a website that called itself “Hack the Pentagon” and was decorated with a grisly-looking skull, you would probably think that you might be somewhere less than legitimate. After all, normally if you hacked The Pentagon you would find yourself in heaps of trouble. Read more…

    Read More

  • UK Regulator: HIV Data Protection Must Improve

    PRIVACY PRIVACY ICO issues call after reprimanding NHS Highland Read More

    Read More

  • GCHQ Updates Security Guidance for Boards

    PRIVACY PRIVACY Agency wants business leaders to get serious about cyber Read More

    Read More

  • Ukrainian Police Bust Multimillion-Dollar Phishing Gang

    PRIVACY PRIVACY More than 100 sites created to lure European victims Read More

    Read More

  • Rising Trend of OneNote Documents for Malware delivery

    PRIVACY PRIVACY Authored By Anandeshwar Unnikrishnan,Sakshi Jaiswal,Anuradha M  McAfee Labs has recently observed a new Malware campaign which used malicious OneNote documents to entice users to click on an embedded file to download and execute the Qakbot trojan.  OneNote is a Microsoft digital notebook application that can be downloaded for free. It is a note-taking…

    Read More

  • Russian Cyberwarfare Documents Leaked

    PRIVACY PRIVACY Now this is interesting: Thousands of pages of secret documents reveal how Vulkan’s engineers have worked for Russian military and intelligence agencies to support hacking operations, train operatives before attacks on national infrastructure, spread disinformation and control sections of the internet. The company’s work is linked to the federal security service or FSB,…

    Read More

  • North Korean Hackers Use Trojanized 3CX DesktopApp in Supply Chain Attacks

    PRIVACY PRIVACY Windows and Mac versions of the software were compromised to deliver infostealers Read More

    Read More

  • Clipboard-injecting malware disguises itself as Tor browser, steals cryptocurrency

    PRIVACY PRIVACY Malware, disguised as copies of Tor, has stolen approximately US $400,000 worth of cryptocurrency from almost 16,000 users worldwide. Read More

    Read More

  • Over 70% of Employees Keep Work Passwords on Personal Devices

    PRIVACY PRIVACY 95% of security leaders are also concerned about phishing attacks via private messaging apps Read More

    Read More

  • FDA Protects Medical Devices Against Cyber-Threats With New Measures

    PRIVACY PRIVACY New medical devices applications should “monitor, identify, and address” cybersecurity issues Read More

    Read More

News, Advisories and much more

Exit mobile version