-
Posted On Uncategorized
New threat trends emerge out of East Asia
Since June 2023, Microsoft has been tracking activity from multiple Chinese and North Korean nation-state groups. Our observations indicate that…
-
Posted On Uncategorized
Critical Flaws in Cacti Framework Could Let Attackers Execute Malicious Code
The maintainers of the Cacti open-source network monitoring and fault management framework have addressed a dozen security flaws, including two critical issues…
-
Posted On Uncategorized
Equipped with AI tools, hackers make apps riskier than ever
An application is more likely to be attacked over a four-week period in 2024 than it was a year back,…
-
Posted On Uncategorized
🏴☠️ Dragonforce has just published a new victim : Watt Carmichael
Watt Carmichael Inc. is a full-service investment management firm offering a full range of investments, including; T-Bills and GIC’s, common…
-
Posted On Uncategorized
Cybersecurity Concerns Surround ChatGPT 4o’s Launch; Open AI Assures Beefed up Safety Measure
The field of Artificial Intelligence is rapidly evolving, and OpenAI’s ChatGPT is a leader in this revolution. This groundbreaking large…
-
Posted On Uncategorized
Credibility in Question: Meesho Data Breach Claims Echo 2020 Leak
A threat actor using the alias qpwomsx has claimed responsibility for an alleged data breach affecting the popular Indian online…
-
Posted On Uncategorized
Ongoing Campaign Bombarded Enterprises with Spam Emails and Phone Calls
Cybersecurity researchers have uncovered an ongoing social engineering campaign that bombards enterprises with spam emails with the goal of obtaining initial access…
-
Posted On Uncategorized
6 Mistakes Organizations Make When Deploying Advanced Authentication
Deploying advanced authentication measures is key to helping organizations address their weakest cybersecurity link: their human users. Having some form of 2-factor…