Cyber Security

N. Korean Hackers ‘Mixing’ macOS Malware Tactics to Evade Detection

Nov 28, 2023NewsroomMalware / Cyber Espionage The North Korean threat actors behind macOS malware strains such as RustBucket and KANDYKORN have been observed "mixing...

The Role of the CISO in Digital Transformation

Modern-day demands require organizations to be flexible and digitally savvy, getting work done remotely and in the public cloud as often as in...

Evacuation of 30,00 hackers – Week in security with Tony Anscombe

Video DEF CON, the annual hacker convention in Las Vegas, was interrupted...

Echoes of Yore hacked! 17,000 game accounts “lost”

Multi-player online role-playing videogame "Ethyrial: Echoes of Yore" has suffered a ransomware attack which saw the deletion of every player's account and the...

Microsoft deprecates Defender Application Guard for Office

Microsoft is deprecating Defender Application Guard for Office and the Windows Security Isolation APIs, and it recommends Defender for Endpoint attack surface reduction rules,...

Experts Uncover Passive Method to Extract Private RSA Keys from SSH Connections

Nov 27, 2023NewsroomServer Security / Encryption A new study has demonstrated that it's possible for passive network attackers to obtain private RSA host keys...

Cyber Threats to Watch Out for in 2024

As technology continues to evolve and expand its reach into every facet of our lives, so do the threats posed by cyber criminals...

A Bard’s Tale – how fake AI bots try to install malware

Scams The AI race is on! It’s easy to lose track of...

Latest articles