Cybersecurity Blog
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Apr 23, 2024NewsroomSupply Chain Attack / Application Security Researchers have identified a dependency confusion ...
Fraudsters Exploit Telegram’s Popularity For Toncoin Scam
Scammers have been observed employing a sophisticated tactic to steal Toncoins (TON) from Telegram users globally. This ...
Nespresso Domain Serves Up Steamy Cup of Phish, No Cream or Sugar
A phishing campaign exploiting a bug in Nespresso’s website has been able to evade detection by taking advantage ...
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
Apr 22, 2024NewsroomCryptocurrency / Artificial Intelligence Microsoft has revealed that North Korea-linked ...
Webinar: Learn Proactive Supply Chain Threat Hunting Techniques
Apr 23, 2024The Hacker NewsThreat Hunting / Software Security In the high-stakes world of cybersecurity, the ...
Behavioral patterns of ransomware groups are changing – Help Net Security
Q1 saw substantial shifts in activity from some of the most prolific Ransomware-as-a-Service (RaaS) groups, according to ...
Russian Sandworm Hackers Targeted 20 Critical Organizations in Ukraine
CERT-UA reports that in March 2024, APT44 conducted operations to disrupt information and communication systems at ...
HHS Beefs Up Privacy Protection for Reproductive Health Info
Healthcare , HIPAA/HITECH , Industry Specific Finalizes HIPAA Privacy Rule Changes Involving PHI Related to Reproductive ...