Cybersecurity Blog
Some Companies Pay Ransomware Attackers Multiple Times, Survey Finds
Some companies are paying ransomware attackers multiple times, with more than a third not receiving the decryption keys ...
Obfuscation: There Are Two Sides To Everything
How to detect and prevent attackers from using these various techniques Obfuscation is an important technique for ...
SMS Stealer Targeting Several Countries with Over 100,000 Malicious Android Apps
The malware was found monitoring OTP messages from over 600 global brands, with victims detected in 113 countries, ...
Security Flaws at UK Elections Agency Left Door Open for Chinese Hackers, Privacy Watchdog Finds
The UK’s Electoral Commission was criticized by the Information Commissioner’s Office (ICO) for failing to protect ...
Microsoft Confirms Azure, 365 Outage Linked to DDoS Attack
Microsoft confirmed that an eight-hour outage on Tuesday affecting its Azure portal, Microsoft 365, and Microsoft ...
Google Chrome Adds App-Bound Encryption to Protect Cookies from Malware
Google has announced that it’s adding a new layer of protection to its Chrome browser through what’s called ...
Secretive: Open-Source App for Storing and Managing SSH Keys in the Secure Enclave
Secretive is an open-source app that securely stores and manages SSH keys in the Secure Enclave for Macs. Storing keys ...
Apple Extends Zero-Day Patch to Older Macs, Urges Immediate Update
Apple has released a critical zero-day patch for older Macs running macOS Monterey 12.7.6, addressing an actively ...