Pro Leaked forensic details of Okta breach reveal finer details of Lapsus$ operation Poor OPSEC and publicly available hacking tools allowed the hackers to pull off one of the most high-profile cyber attacks of the year so far 29 Mar
Pro Google patches second Chrome browser zero-day of 2022 Google acted quickly to secure against the type confusion vulnerability that was under active exploitation 28 Mar
Pro Kaspersky declared threat to US national security Kaspersky was added to the FCC's blacklist alongside China Mobile International and China Telecom 28 Mar
Pro What is the Lapsus$ group and who is behind the criminal operation? The most prolific cyber criminals of 2022 have largely evaded identification for months despite being anything but secretive in the way they work 24 Mar
Pro EU proposes new bloc-wide cyber security regulations The Computer Emergency Response Team to be renamed the Cybersecurity Centre 23 Mar
Pro Okta confirms investigation into alleged Lapsus$ security breach Hackers claim to have had full access to the back end of identity and authentication provider for at least two months 22 Mar
Pro Western Digital flaw allows hackers to access restricted files The proprietary file explorer app contained directory traversal bug, says storage vendor 22 Mar
Pro Germany advises against using Kaspersky software due to hacking risk The Moscow-headquartered cyber security company has a history of being targeted for its alleged links to the Russian state 16 Mar
Pro US law passed forcing companies to report cyber attacks, ransomware payments Operators of critical infrastructure will face a subpoena for failing to report cyber incidents 15 Mar
Pro Ukrainian ethical hackers targeted by Russian malware attacks Cisco Talos researchers say the IT Army of Ukraine's Telegram channel is being hit with malicious links 11 Mar
Trade Encryption software market to hit $22.1bn by 2026 The IT and telecommunications industries are expected to drive the demand 9 Mar
Pro Google uncovers Russian phishing campaign targeting Ukrainian news provider The tech giant has also recorded repeated DDoS attempts against the Ukrainian government 8 Mar
Pro FBI: Ragnar Locker ransomware breached 52 US critical infrastructure orgs The news comes as three big cyber security vendors join hands to offer critical infrastructure organisations free security products and support 8 Mar
Blogs None shall pass The days of the password are numbered. Unfortunately, it’s a very big number, says Jason Walsh 8 Mar
Pro Nvidia hackers leak 190GB of data allegedly stolen from Samsung The LAPSUS$ hacking group claims to have breached the tech giant to steal internal data and source code 7 Mar
Life Anonymous hacks website of Russian Space Research Institute Russia’s lunar missions files were obtained through a brute-force attack on a private service hosted by Roscosmos 4 Mar
Life How Telegram became Ukraine’s biggest digital ally in the war The messaging app has experienced a surge in demand as users flock to the platform for news and instructions on how to participate in the effort to... 3 Mar
Pro Conti source code leaked by Ukrainian researcher Source code hits the public domain as fallout continues over ransomware group's support for Russia 3 Mar
Pro Hacking group leaks Nvidia data following alleged ransomware attack LAPSU$ claims to have released Nvidia source code and highly confidential GPU driver data 28 Feb
Pro Conti ransomware gang data leaked by Ukrainian cyber researcher The data includes internal chat logs between members and affiliates of the group, unveiling their personal details, conflicts, and accusations 28 Feb
Pro Organisations urged to boost cyber defences in wake of Ukraine cyber attacks Historical pattern of cyber attacks against Ukraine have had international consequences 24 Feb
Pro GitHub goes open source on security research Community members, enthusiasts, researchers, and academics are now able to submit their own research to widen the understanding of security... 23 Feb
Pro Novel phishing method deceives users with ubiquitous IT support tool The man-in-the-middle attack can be used for a range of nefarious purposes, including credential theft and malicious code injection 21 Feb
Pro UK, US officials say Russia was behind DDoS attacks against Ukraine The Russian Embassy in the US slammed the accusations as "baseless statements" 21 Feb
Pro Cisco patches bug that could break its e-mail security service with a single message A carefully crafted email could freeze Cisco's Email Security Appliance interface and stop it processing messages 18 Feb
Pro AWS’ CodeGuru Reviewer updated to tackle Log4j Amazon's code reviewer also now includes a library detailing every detector used by the platform 17 Feb
Life Privacy and security of personal data biggest concerns for senior citizens online More than half of older people believe they would feel less isolated if they could connect to others online 16 Feb
Life RDS hit by ransomware attack Breach occured on 8 February and affects commercial as well as personal data 15 Feb
Pro Apple users told to update their devices to fix critical WebKit flaw The security flaw allowed code execution on a range of devices and represents the third major vulnerability to be patched by Apple this year 11 Feb
Pro Microsoft’s Patch Tuesday fixes 70 vulnerabilities Microsoft will be hoping for a bug-free round of patches after admins complained of January's updates breaking more components than they fixed 10 Feb
Pro Google claims default 2FA reduced account breaches by 50% The auto-enabled security mechanism was first introduced late last year 10 Feb
Pro Google Cloud adds cryptomining protection following widespread exploitation In nearly all cases of compromised Google Cloud instances, cryptomining malware was installed within 22 seconds 8 Feb
Pro US telcos request $5.6bn to rip out Huawei, ZTE equipment The FCC says it has received 181 applications from small carriers to access its funding 7 Feb
Pro QNAP ransomware victims dealt double blow as firmware update hampers decryption Emisoft releases decryptor for victims while QNAP explains why and how it controversially auto-updated user’s products 2 Feb
Pro FBI urges Olympic athletes to leave personal devices at home Threat actors expected to use a broad range of cyber activities to disrupt the games 1 Feb
Pro Log4j vulnerability continues to stress CISOs Avast's latest threat report also reveals the resurrection of the infamous Emotet botnet 31 Jan
Pro Google Drive accounted for the most malware downloads in 2021 NetSkope research malware downloaded via cloud apps is now more prevalent than web-delivered malware 13 Jan
Pro Cyber attacks on corporate networks increased 50% in 2021 Check Point data reveals an upward trend of malicious activity since mid-2020 12 Jan
Insights Will data security turn a corner in 2022? Balancing policy and technology could be the difference this year 11 Jan
Pro Europol ordered to delete huge cache of unlawfully stored data Crime-fighting agency has failed to implement the necessary data protection measures it was told to make more than a year ago 11 Jan
Subscribers 0
Fans 0
Followers 0
Followers