Cybersecurity Blog
Cyber Staffing Shortages Remain CISOs’ Biggest Challenge
A recent report by Command Zero highlights the struggles CISOs and their teams are dealing with, including navigating ...
New RansomHub Attack Uses TDSSKiller and LaZagne, Disables EDR
The RansomHub ransomware gang has been found using Kaspersky’s TDSSKiller tool to disable EDR software on target ...
Top 3 Threat Report Insights for Q2 2024
Cato CTRL (Cyber Threats Research Lab) has released its Q2 2024 Cato CTRL SASE Threat Report. The report highlights ...
Iranian Cyber Group OilRig Targets Iraqi Government in Sophisticated Malware Attack
Iraqi government networks have emerged as the target of an “elaborate” cyber attack campaign orchestrated by ...
Kali Linux 2024.3 Released: 11 New Tools, Qualcomm Snapdragon SDM845 SoC Support
Kali Linux 2024. 3 has been released with 11 new tools and added support for Qualcomm Snapdragon SDM845 SoC devices. ...
Ireland’s Watchdog Launches Inquiry into Google’s AI Data Practices in Europe
The Irish Data Protection Commission (DPC) has announced that it has commenced a “Cross-Border statutory ...
Microsoft Discloses Four Zero-Days in September Update
Microsoft recently revealed four zero-day vulnerabilities in its September update, part of the Patch Tuesday release ...
New PIXHELL Acoustic Attack Leaks Secrets From LCD Screen Noise
New acoustic attack named ‘PIXHELL’ can leak secrets from air-gapped systems through LCD monitors without ...