QR code-based email attacks have increased in the last quarter, with attackers specifically targeting corporate executives and managers, reinforcing recommendations that companies place additional digital protections around their corporate leadership.…
Category: Cyber Security
Fortinet warns of a critical vulnerability in FortiOS SSL VPN in case of active exploitation
09 February 2024PressroomZero-day vulnerabilities/network security Fortinet has revealed a critical new security flaw in its FortiOS SSL VPN that it says will likely be exploited in the wild. The vulnerability,…
The stakes are high for CISOs
Corporate security Heavy workloads and the specter of personal responsibility for incidents put a strain on safety leaders, so much so that many of them are looking for a way…
The “Coyote” malware begins its hunt, preying on 61 banking apps
Researchers have discovered a new banking Trojan they’ve nicknamed “Coyote,” which searches for credentials for 61 different online banking applications. “Coyote”, detailed by Kaspersky in an analysis today, it stands…
etherFAX Pioneering interoperable standards for secure cloud faxing
PRESS RELEASE HOLMDEL, NJ, February 2019 8, 2024 /PRNewswire-PRWeb/ — etherFAX is proud to serve as a co-chair leading the Interoperable Secure Cloud Fax Consensus Body, which defines a proposed…
Billington CyberSecurity to host first state and local Cyber Summit following major cyberattacks
PRESS RELEASE WASHINGTON–(COMMERCIAL WIRE)–The inauguration Billington Local and State Cybersecurity Summit will be held on March 19 and 20, 2024 at the National Press Club in Washington, DC and also…
Kimsuky’s New Golang Thieves “Troll” and “GoBear” Target South Korea
08 February 2024PressroomCyber espionage/Malware The North Korea-linked state actor known as Kimsuky is suspected of using a previously undocumented Golang-based information thief called Troll thief. The malware steals “SSH, FileZilla,…
Because the demand for tabletop exercises is growing
Organizations that regularly defend against cyberattacks may find it useful to occasionally take a step back and test their defense and response capabilities. One way to do this is through…
Researchers reverse engineer the latest escape methods
08 February 2024PressroomEndpoint security/malware The threat actors behind a malware called loader HijackLoader have added new techniques to evade the defense, as the malware continues to be increasingly used by…
5 AI priorities to stay competitive
COMMENT Artificial Intelligence (AI): Not since the invention of the operating system have we seen a technology poised to have such a far-reaching impact on the way we work and…