Cyber Security Researchers Pioneer PoC Exploit for NSA-Reported Bug in Windows CryptoAPI Jan 25, 2023 darkreading.com The security vulnerability allows attackers to spoof a target certificate and masquerade as any website, among other things.
Technology Royal Mail halts international services after cyberattack Jan 11, 2023 bleepingcomputer.com The Royal Mail, UK's leading mail delivery service, has stopped its international shipping services due to "severe service disruption" caused…
Technology Bitdefender releases free MegaCortex ransomware decryptor Jan 5, 2023 bleepingcomputer.com Antivirus company Bitdefender has released a decryptor for the MegaCortex ransomware family, making it possible for victims of the once…
Cyber Security What we can learn from The Undeclared War Dec 31, 2022 cyberdefensemagazine.com By Nicole Allen, Senior Marketing Executive at Salt Communications The Undeclared War, a drama series on Channel 4, […] The…
Cyber Security For Cybercriminals, the Game is On and They’re Playing to Win Nov 22, 2022 cyberdefensemagazine.com Why Football Clubs Need to Up their Cyber Defence By Ravi Pather, VP, Europe and Middle East, Ericom […] The…
Technology British govt is scanning all Internet devices hosted in UK Nov 4, 2022 bleepingcomputer.com The United Kingdom's National Cyber Security Centre (NCSC), the government agency that leads the country's cyber security mission, is now scanning…
Cyber Security NCSC Implements Vulnerability Scanning Program Across UK Nov 3, 2022 darkreading.com The cybersecurity agency announced it intends to scan all Internet-connected devices hosted in the UK for known vulnerabilities.
Technology OpenSSL fixes two high severity vulnerabilities, what you need to know Nov 1, 2022 bleepingcomputer.com The OpenSSL Project has patched two high-severity security flaws in its open-source cryptographic library used to encrypt communication channels and…
Cyber Security Top Trends in Cyber Security Post-Pandemic Oct 16, 2022 cyberdefensemagazine.com By Suchita Gupta, Associate Content Writer, Allied Market Research Cyber security is a fast-moving sector as both cyber […] The…
Technology Death of Queen Elizabeth II exploited to steal Microsoft credentials Sep 14, 2022 bleepingcomputer.com Threat actors are exploiting the death of Queen Elizabeth II in phishing attacks to lure their targets to sites that…
Researchers Pioneer PoC Exploit for NSA-Reported Bug in Windows CryptoAPI
The security vulnerability allows attackers to spoof a target certificate and masquerade as any website, among other things.
Royal Mail halts international services after cyberattack
The Royal Mail, UK's leading mail delivery service, has stopped its international shipping services due to "severe service disruption" caused…
Bitdefender releases free MegaCortex ransomware decryptor
Antivirus company Bitdefender has released a decryptor for the MegaCortex ransomware family, making it possible for victims of the once…
What we can learn from The Undeclared War
By Nicole Allen, Senior Marketing Executive at Salt Communications The Undeclared War, a drama series on Channel 4, […] The…
For Cybercriminals, the Game is On and They’re Playing to Win
Why Football Clubs Need to Up their Cyber Defence By Ravi Pather, VP, Europe and Middle East, Ericom […] The…
British govt is scanning all Internet devices hosted in UK
The United Kingdom's National Cyber Security Centre (NCSC), the government agency that leads the country's cyber security mission, is now scanning…
NCSC Implements Vulnerability Scanning Program Across UK
The cybersecurity agency announced it intends to scan all Internet-connected devices hosted in the UK for known vulnerabilities.
OpenSSL fixes two high severity vulnerabilities, what you need to know
The OpenSSL Project has patched two high-severity security flaws in its open-source cryptographic library used to encrypt communication channels and…
Top Trends in Cyber Security Post-Pandemic
By Suchita Gupta, Associate Content Writer, Allied Market Research Cyber security is a fast-moving sector as both cyber […] The…
Death of Queen Elizabeth II exploited to steal Microsoft credentials
Threat actors are exploiting the death of Queen Elizabeth II in phishing attacks to lure their targets to sites that…