The QR code “opts out” of attacks against executives, bypassing email security

QR code-based email attacks have increased in the last quarter, with attackers specifically targeting corporate executives and managers, reinforcing recommendations that companies place additional digital protections around their corporate leadership.…

Fortinet warns of a critical vulnerability in FortiOS SSL VPN in case of active exploitation

09 February 2024PressroomZero-day vulnerabilities/network security Fortinet has revealed a critical new security flaw in its FortiOS SSL VPN that it says will likely be exploited in the wild. The vulnerability,…

The stakes are high for CISOs

Corporate security Heavy workloads and the specter of personal responsibility for incidents put a strain on safety leaders, so much so that many of them are looking for a way…

The “Coyote” malware begins its hunt, preying on 61 banking apps

Researchers have discovered a new banking Trojan they’ve nicknamed “Coyote,” which searches for credentials for 61 different online banking applications. “Coyote”, detailed by Kaspersky in an analysis today, it stands…

etherFAX Pioneering interoperable standards for secure cloud faxing

PRESS RELEASE HOLMDEL, NJ, February 2019 8, 2024 /PRNewswire-PRWeb/ — etherFAX is proud to serve as a co-chair leading the Interoperable Secure Cloud Fax Consensus Body, which defines a proposed…

Billington CyberSecurity to host first state and local Cyber ​​Summit following major cyberattacks

PRESS RELEASE WASHINGTON–(COMMERCIAL WIRE)–The inauguration Billington Local and State Cybersecurity Summit will be held on March 19 and 20, 2024 at the National Press Club in Washington, DC and also…

Kimsuky’s New Golang Thieves “Troll” and “GoBear” Target South Korea

08 February 2024PressroomCyber ​​espionage/Malware The North Korea-linked state actor known as Kimsuky is suspected of using a previously undocumented Golang-based information thief called Troll thief. The malware steals “SSH, FileZilla,…

Because the demand for tabletop exercises is growing

Organizations that regularly defend against cyberattacks may find it useful to occasionally take a step back and test their defense and response capabilities. One way to do this is through…

Researchers reverse engineer the latest escape methods

08 February 2024PressroomEndpoint security/malware The threat actors behind a malware called loader HijackLoader have added new techniques to evade the defense, as the malware continues to be increasingly used by…

5 AI priorities to stay competitive

COMMENT Artificial Intelligence (AI): Not since the invention of the operating system have we seen a technology poised to have such a far-reaching impact on the way we work and…