A sophisticated phishing-as-a-service (PhaaS) platform called Darcula has set its sights on organizations in over 100 countries leveraging a massive network of over 20,000 spoofed domains to help cybercriminals launch…
Category: Cyber Security
Suspected MFA bomb attacks target Apple iPhone users
Attackers are targeting Apple iPhone users in a wave of attacks Attacks on the Ministry of Foreign Affairs who use an incessant series of legitimate password reset notification alerts in…
Avoid application security blind spots with OPSWAT and F5
March 28, 2024News about hackersApplication Security/Webinar Considering the ever-changing state of cybersecurity, it’s never too late to ask yourself, “Am I doing what’s necessary to keep my organization’s web applications…
Companies with cyber governance create 4 times more value
While the US Securities and Exchange Commission published guidelines for better governance of cybersecurity for years public bodies have mostly ignored them. And while the requirements may be difficult to…
The art of safeguarding non-human identities
March 28, 2024News about hackersSecrets Management/Zero Trust In the whirlwind of modern software development, teams race against time, constantly pushing the boundaries of innovation and efficiency. This relentless pace is…
Vietnamese securities broker suffers cyber attack that suspends trading
VNDirect, one of Vietnam’s largest brokers, has in recent hours begun the process of restoring its systems after a cyber attack last weekend that forced it to suspend trading transactions.…
Unpatched Apple M-Chip Vulnerability Allows Encryption Bypass
Apple last week secretly published a workaround for a vulnerability in its M-series processors that attackers could exploit to steal cryptographic keys. More details have now come to light as…
Telegram offers a Premium subscription in exchange for using your number to send OTPs
March 28, 2024PressroomTechnology/Data Privacy In June 2017, a study of more than 3,000 Massachusetts Institute of Technology (MIT) students published by the National Bureau for Economic Research (NBER) found that…
Saudi Arabia and the United Arab Emirates top the list of nations targeted by the APT in the Middle East
Sixteen Advanced Persistent Threat (APT) groups have targeted organizations in the Middle East over the past two years with cyberattacks focused on government agencies, manufacturing companies and the energy sector.…
Millions of hotel rooms around the world are vulnerable to lock exploitation
Researchers have developed a simple exploit capable of opening all doors in over 10,000 hotels worldwide. Saflok brand RFID-based key card locks have been around for 36 years. But only…