Cybersecurity Blog
New Webinar: Avoiding Application Security Blind Spots with OPSWAT and F5
Mar 28, 2024The Hacker NewsApplication Security / Webinar Considering the ever-changing state of cybersecurity, ...
Behind the Scenes: The Art of Safeguarding Non-Human Identities
Mar 28, 2024The Hacker NewsSecrets Management / Zero Trust In the whirlwind of modern software development, teams race ...
Darcula Phishing Network Leveraging RCS and iMessage to Evade Detection
A sophisticated phishing-as-a-service (PhaaS) platform called Darcula has set its sights on organizations in over 100 ...
Telegram Offers Premium Subscription in Exchange for Using Your Number to Send OTPs
Mar 28, 2024NewsroomTechnology / Data Privacy In June 2017, a study of more than 3,000 Massachusetts Institute of ...
Hackers Hit Indian Defense, Energy Sectors with Malware Posing as Air Force Invite
Mar 27, 2024NewsroomCyber Espionage / Data Breach Indian government entities and energy companies have been targeted ...
CISA Warns: Hackers Actively Attacking Microsoft SharePoint Vulnerability
Mar 27, 2024NewsroomThreat Intelligence / Network Security The U.S. Cybersecurity and Infrastructure Security Agency ...
Microsoft Edge Bug Could Have Allowed Attackers to Silently Install Malicious Extensions
Mar 27, 2024NewsroomVulnerability / API Security A now-patched security flaw in the Microsoft Edge web browser could ...
Enhancing cyber security in financial services: Simulated cyber attacks
CREST’s Nick Benson examines whether financial regulators are doing enough to set mandatory minimum standards for ...