Malicious npm Packages Aim to Target Developers for Source Code Theft

30/08/2023 0 Comments 0 tags

An unknown threat actor is leveraging malicious npm packages to target developers with an aim to steal source code and configuration files from victim machines, a sign of how threats

How to Prevent ChatGPT From Stealing Your Content & Traffic

30/08/2023 0 Comments 0 tags

ChatGPT and similar large language models (LLMs) have added further complexity to the ever-growing online threat landscape. Cybercriminals no longer need advanced coding skills to execute fraud and other damaging

LockBit 3.0 Ransomware Builder Leak Gives Rise to Hundreds of New Variants

26/08/2023 0 Comments 0 tags

The leak of the LockBit 3.0 ransomware builder last year has led to threat actors abusing the tool to spawn new variants. Russian cybersecurity company Kaspersky said it detected a ransomware intrusion

Kroll Suffers Data Breach: Employee Falls Victim to SIM Swapping Attack

26/08/2023 0 Comments 0 tags

Risk and financial advisory solutions provider Kroll on Friday disclosed that one of its employees fell victim to a “highly sophisticated” SIM swapping attack. The incident, which took place on

Urgent FBI Warning: Barracuda Email Gateways Vulnerable Despite Recent Patches

25/08/2023 0 Comments 0 tags

The U.S. Federal Bureau of Investigation (FBI) is warning that Barracuda Networks Email Security Gateway (ESG) appliances patched against a recently disclosed critical flaw continue to be at risk of

China-Linked Flax Typhoon Cyber Espionage Targets Taiwan’s Key Sectors

25/08/2023 0 Comments 0 tags

A nation-state activity group originating from China has been linked to cyber attacks on dozens of organizations in Taiwan as part of a suspected espionage campaign. The Microsoft Threat Intelligence

Navigating Legacy Infrastructure: A CISO’s Actionable Strategy for Success

25/08/2023 0 Comments 0 tags

Every company has some level of tech debt. Unless you’re a brand new start-up, you most likely have a patchwork of solutions that have been implemented throughout the years, often

Learn How Your Business Data Can Amplify Your AI/ML Threat Detection Capabilities

25/08/2023 0 Comments 0 tags

In today’s digital landscape, your business data is more than just numbers—it’s a powerhouse. Imagine leveraging this data not only for profit but also for enhanced AI and Machine Learning

Two LAPSUS$ Hackers Convicted in London Court for High-Profile Tech Firm Hacks

25/08/2023 0 Comments 0 tags

Two U.K. teenagers have been convicted by a jury in London for being part of the notorious LAPSUS$ transnational gang and for orchestrating a series of brazen, high-profile hacks against

Meta Set to Enable Default End-to-End Encryption on Messenger by Year End

24/08/2023 0 Comments 0 tags

Meta has once again reaffirmed its plans to roll out support for end-to-end encryption (E2EE) by default for one-to-one friends and family chats on Messenger by the end of the