Cyber Security ‘Evil Telegram’ Spyware Campaign Infects 60K+ Mobile Users Sep 8, 2023 darkreading.com Legitimate-seeming Telegram "mods" available in the official Google Play store for the encrypted messaging app signal the rise of a…
Technology Dymocks Booksellers suffers data breach impacting 836k customers Sep 8, 2023 bleepingcomputer.com Dymocks Booksellers is warning customers their personal information was exposed in a data breach after the company's database was shared…
Cyber Security 3 Strategies to Defend Against Resurging Infostealers Sep 8, 2023 darkreading.com Infostealer incidents have more than doubled recently, making it critical to bolster your defenses to mitigate this growing threat.
Technology Cisco warns of VPN zero-day exploited by ransomware gangs Sep 8, 2023 bleepingcomputer.com Cisco is warning of a CVE-2023-20269 zero-day vulnerability in its Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense…
Cyber Security Software Supply Chain Strategies to Parry Dependency Confusion Attacks Sep 7, 2023 darkreading.com Bad actors practice to deceive package managers with a tangled web of methods. Here's how to hoist them by their…
Cyber Security Microsoft ID Security Gaps That Let Threat Actor Steal Signing Key Sep 7, 2023 darkreading.com China's Storm-0558 accessed user emails at some 25 enterprise organizations earlier this year using forged tokens.
Technology Google Looker Studio abused in cryptocurrency phishing attacks Sep 7, 2023 bleepingcomputer.com Cybercriminals are abusing Google Looker Studio to create counterfeit cryptocurrency phishing websites that phish digital asset holders, leading to account…
Cyber Security AI In Cybersecurity – Risks and Rewards Sep 7, 2023 cyberdefensemagazine.com By Aimei Wei, Co-Founder and CTO, Stellar Cyber The global cybersecurity workforce grew to a record 4.7 million people in…
Cyber Security Coding Tips to Sidestep JavaScript Vulnerabilities Sep 6, 2023 darkreading.com This Tech Tip focuses on best security practices to write secure JavaScript code.
Technology Flipper Zero can be used to launch iOS Bluetooth spam attacks Sep 6, 2023 bleepingcomputer.com The Flipper Zero portable wireless pen-testing and hacking tool can be used to aggressively spam Bluetooth connection messages at Apple…
‘Evil Telegram’ Spyware Campaign Infects 60K+ Mobile Users
Legitimate-seeming Telegram "mods" available in the official Google Play store for the encrypted messaging app signal the rise of a…
Dymocks Booksellers suffers data breach impacting 836k customers
Dymocks Booksellers is warning customers their personal information was exposed in a data breach after the company's database was shared…
3 Strategies to Defend Against Resurging Infostealers
Infostealer incidents have more than doubled recently, making it critical to bolster your defenses to mitigate this growing threat.
Cisco warns of VPN zero-day exploited by ransomware gangs
Cisco is warning of a CVE-2023-20269 zero-day vulnerability in its Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense…
Software Supply Chain Strategies to Parry Dependency Confusion Attacks
Bad actors practice to deceive package managers with a tangled web of methods. Here's how to hoist them by their…
Microsoft ID Security Gaps That Let Threat Actor Steal Signing Key
China's Storm-0558 accessed user emails at some 25 enterprise organizations earlier this year using forged tokens.
Google Looker Studio abused in cryptocurrency phishing attacks
Cybercriminals are abusing Google Looker Studio to create counterfeit cryptocurrency phishing websites that phish digital asset holders, leading to account…
AI In Cybersecurity – Risks and Rewards
By Aimei Wei, Co-Founder and CTO, Stellar Cyber The global cybersecurity workforce grew to a record 4.7 million people in…
Coding Tips to Sidestep JavaScript Vulnerabilities
This Tech Tip focuses on best security practices to write secure JavaScript code.
Flipper Zero can be used to launch iOS Bluetooth spam attacks
The Flipper Zero portable wireless pen-testing and hacking tool can be used to aggressively spam Bluetooth connection messages at Apple…