
In Israel, the Shin Bet’s ‘Tool’ will be watching you!
“We’ve got monsters.” That is how Sasson (Sassi) Elia, the outgoing head of the Information Systems Technology division of the internal Israel Security Agency (also
“We’ve got monsters.” That is how Sasson (Sassi) Elia, the outgoing head of the Information Systems Technology division of the internal Israel Security Agency (also
A 3rd-party IT provider exposed valuable airline data that experts say could be a treasure-trove for cyber-criminals. Malaysia Airlines sent out an email to frequent
Full dumps of email boxes, lateral movement & backdoors characterise sophisticated attacks by a Chinese APT – while other incidents spread rapidly. Microsoft has discovered
Hackers behind previous iPhone jailbreak tools have released a jailbreak update based on a recently discovered & patched iPhone vulnerability. According to iPhone jailbreakers at UnC0ver, the
The Oblique RAT malware is now hiding its payloads as seemingly innocent image files that are hidden on compromised websites. Emails spreading the Oblique RAT
The Ryuk issue now has a new technique – Self-replication via SMB shares & port scanning. A new version of the Ryuk ransomware is capable
Cyber-security firm Genua fixed a critical flaw in its GenuGate High Resistance Firewall, which allowed attackers to log in as root users. Germany-based cyber-security company
A spear-phishing campaigned linked to a North Korean APT uses “Nuke Sped” malware in cyber-espionage attacks against defence companies. The notorious N. Korean APT known
UK energy company Npower has permanently closed its mobile app, after finding that hackers had used it to steal sensitive information from customers. The company
Another human-related error — this time a flaw in a health department website in the State of Bengal, India — has exposed the confidential results
A critical vulnerability in Cisco Systems’ inter-site policy manager software could allow a remote attacker to bypass authentication. Cisco also eliminated a critical security flaw
As more organisations move to Office 365, cyber-criminals are using Outlook, Teams & other Microsoft-themed phishing lures to swipe user credentials. Nearly half of phishing
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.