Cybersecurity Blog
Dropbox Used to Steal Credentials and Bypass MFA in Phishing Campaign
A novel phishing campaign leveraged legitimate Dropbox infrastructure and successfully bypassed multifactor ...
Guide: On-Prem is Dead. Have You Adjusted Your Web DLP Plan?
Mar 11, 2024The Hacker NewsCybersecurity / Browser Security As the shift of IT infrastructure to cloud-based solutions ...
Immediate AI risks and tomorrow’s dangers – Help Net Security
“At the most basic level, AI has given malicious attackers superpowers,” Mackenzie Jackson, developer and security ...
Around We Go: Planet Stealer Emerges – InQuest
Recent discussion around an emerging information-stealing trojan project reinforces the continual need to track ...
UK government’s ransomware failings leave country ‘exposed and unprepared’
The British government has been accused by a parliamentary committee of taking the “ostrich strategy” by burying its ...
Cisco addressed severe flaws in its Secure Client
Cisco addressed severe flaws in its Secure Client Pierluigi Paganini March 08, 2024 Cisco addressed two high-severity ...
Zama’s Homomorphic Encryption Tech Lands it $73M on a Valuation of Nearly $400M
Zama, a Paris-based startup, has raised $73 million in a Series A funding round to develop and commercialize homomorphic ...
BianLian Threat Actors Exploiting JetBrains TeamCity Flaws in Ransomware Attacks
Mar 11, 2024NewsroomRansomware / Vulnerability The threat actors behind the BianLian ransomware have been observed ...