Cybersecurity Blog
EU Agrees ‘Cyber Solidarity Act’ to Bolster Incident Response and Reco
The European Union (EU) has agreed new rules to strengthen cyber incident response and recovery across member states, ...
Hacked WordPress Sites Abusing Visitors’ Browsers for Distributed Brute-Force Attacks
Mar 07, 2024NewsroomVulnerability / Web Security Threat actors are conducting brute-force attacks against WordPress ...
Chinese State Hackers Target Tibetans with Supply Chain, Watering Hole Attacks
Mar 07, 2024NewsroomCyber Espionage / Software Security The China-linked threat actor known as Evasive Panda ...
PetSmart Warns of Credential Stuffing Attacks Trying to Hack Accounts
PetSmart, a major pet retail company, has issued a warning to customers about credential stuffing attacks aimed at ...
Capita says cyberattack contributed to annual loss of more than £106 million
Capita, the British outsourcing company hit by a ransomware attack last March, has reported losing more than £106.6 ...
From Web3 Drainer to Distributed WordPress Brute Force Attack
Two weeks ago we discussed a new development in website hacks: Web3 crypto wallet drainers. We’ve been closely following ...
5 ways to keep API integrations secure – Help Net Security
API integrations often handle sensitive data, such as employees’ personally identifiable information (PII), companies’ ...
Linux Malware targets misconfigured misconfigured Apache Hadoop, Confluence, Docker, and Redis servers
Linux Malware targets misconfigured misconfigured Apache Hadoop, Confluence, Docker, and Redis servers Pierluigi ...