The international body isn't doing enough to protect details on dissidents and activists gathered by peacekeeping operations, particularly across Central…
Cybercriminals are selling custom Raspberry Pi software called 'GEOBOX' on Telegram, which allows inexperienced hackers to convert the mini-computers into…
CISO Corner: Cyber-Pro Swindle; New Faces of Risk; Cyber Boosts Valuation
Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also…
Activision: Enable 2FA to secure accounts recently stolen by malware
An infostealer malware campaign has reportedly collected millions of logins from users of various gaming websites, including players that use cheats,…
UN Peace Operations Under Fire From State-Sponsored Hackers
The international body isn't doing enough to protect details on dissidents and activists gathered by peacekeeping operations, particularly across Central…
How Pentesting-as-a-Service can Reduce Overall Security Costs
Penetration testing plays a critical role in finding application vulnerabilities before they can be exploited. Learn more from Outpost24 on…
Institutionalizing Awareness to Stop Cyberattacks
By Aimei Wei, Founder and CTO, Stellar Cyber Large and mid-sized organizations are always hoping for a ‘silver bullet’ technology…
INC Ransom threatens to leak 3TB of NHS Scotland stolen data
The INC Ransom extortion gang is threatening to publish three terabytes of data allegedly stolen after breaching the National Health Service…
Finland confirms APT31 hackers behind 2021 parliament breach
The Finnish Police confirmed on Tuesday that the APT31 hacking group linked to the Chinese Ministry of State Security (MSS)…
$700 cybercrime software turns Raspberry Pi into an evasive fraud tool
Cybercriminals are selling custom Raspberry Pi software called 'GEOBOX' on Telegram, which allows inexperienced hackers to convert the mini-computers into…
Hackers exploit Ray framework flaw to breach servers, hijack resources
A new hacking campaign dubbed "ShadowRay" targets an unpatched vulnerability in Ray, a popular open-source AI framework, to hijack computing…
What are the Essential Skills for Cyber Security Professionals in 2024?
Where should you invest time and resources to drive success when it comes to the must-have skills and tools for…