Cybersecurity Blog
Hidden dangers loom for subsea cables, the invisible infrastructure of the internet – Help Net Security
More than 97% of the world’s internet traffic passes through subsea cables at some point, according to ENISA. Subsea ...
Github Passkeys Generally Available for Passwordless Sign-Ins
The adoption of passkeys by GitHub, Microsoft, and Google, among other technology giants, demonstrates a growing trend ...
New Report Uncovers 3 Distinct Clusters of China-Nexus Attacks on Southeast Asian Government
An unnamed Southeast Asian government has been targeted by multiple China-nexus threat actors as part of espionage ...
Deadglyph: New Advanced Backdoor with Distinctive Malware Tactics
Sep 23, 2023THNCyber Espionage / Malware Cybersecurity researchers have discovered a previously undocumented advanced ...
Update: Dallas Says Royal Ransomware Breached Its Network Using Stolen Account
Royal gained access to the City’s network using a stolen domain service account in early April and maintained ...
Government of Bermuda Links Cyberattack to Russian Hackers
“The public is advised that the Government Is currently experiencing internet/email and phone service ...
Chinese, North Korean Nation-State Groups Target Health Data
Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Healthcare HHS Report Lists APT41, APT43 and ...
New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware
The three zero-day flaws addressed by Apple on September 21, 2023, were leveraged as part of an iPhone exploit chain in ...