Cyber Security

Siemens PLCs Still Vulnerable to Stuxnet-Like Cyberattacks

Programmable logic controllers (PLCs) that were vulnerable to the Stuxnet attack are still in use globally and rarely have security controls deployed —...

Dear all! What are some common subject lines in phishing emails?

In 2014, a data breach exposed information of three billion Yahoo users. In 2016, Sony Pictures employees saw sensitive...

Linux version of Qilin ransomware focuses on VMware ESXi

A sample of the Qilin ransomware gang's VMware ESXi encryptor has been found and it could be one of the most advanced and...

CACTUS Ransomware Exploits Qlik Sense Vulnerabilities in Targeted Attacks

Nov 30, 2023NewsroomRansomware / Vulnerability A CACTUS ransomware campaign has been observed exploiting recently disclosed security flaws in a cloud analytics and business intelligence...

Simple Hacking Technique Can Extract ChatGPT Training Data

Can getting ChatGPT to repeat the same word over and over again cause it to regurgitate large amounts of its training data, including...

How robotic vacuums can spy on you

Internet of Things, Digital Security, Privacy Mitigate the risk of data leaks...

a baseline that drives up security for the industry

Nearly half of third-parties fail to meet two or more of the Minimum Viable Secure Product controls. Why is this a problem? Because...

Latest articles