U.S. Treasury Sanctions Executives Linked to Intellexa Predator Spyware Operation

17/09/2024 0 Comments 0 tags

The U.S. Department of Treasury has imposed fresh sanctions against five executives and one entity with ties to the Intellexa Consortium for their role in the development, operation, and distribution

Google Chrome Switches to ML-KEM for Post-Quantum Cryptography Defense

17/09/2024 0 Comments 0 tags

Google has announced that it will be switching from KYBER to ML-KEM in its Chrome web browser as part of its ongoing efforts to defend against the risk posed by

How to Investigate ChatGPT activity in Google Workspace

17/09/2024 0 Comments 0 tags

Since launching ChatGPT in 2022, OpenAI has defied expectations with a steady stream of product announcements and enhancements. One such announcement came on May 16, 2024, and for most consumers,

Binance Warns of Rising Clipper Malware Attacks Targeting Cryptocurrency Users

17/09/2024 0 Comments 0 tags

Cryptocurrency exchange Binance is warning of an “ongoing” global threat that’s targeting cryptocurrency users with clipper malware with the goal of facilitating financial fraud. Clipper malware, also called ClipBankers, is

SolarWinds Issues Patch for Critical ARM Vulnerability Enabling RCE Attacks

17/09/2024 0 Comments 0 tags

SolarWinds has released fixes to address two security flaws in its Access Rights Manager (ARM) software, including a critical vulnerability that could result in remote code execution. The vulnerability, tracked

Master Your PCI DSS v4 Compliance with Innovative Smart Approvals

16/09/2024 0 Comments 0 tags

The PCI DSS landscape is evolving rapidly. With the Q1 2025 deadline looming ever larger, businesses are scrambling to meet the stringent new requirements of PCI DSS v4.0. Two sections

From Breach to Recovery: Designing an Identity-Focused Incident Response Playbook

16/09/2024 0 Comments 0 tags

Imagine this… You arrive at work to a chaotic scene. Systems are down, panic is in the air. The culprit? Not a rogue virus, but a compromised identity. The attacker

North Korean Hackers Target Cryptocurrency Users on LinkedIn with RustDoor Malware

16/09/2024 0 Comments 0 tags

Cybersecurity researchers are continuing to warn about North Korean threat actors’ attempts to target prospective victims on LinkedIn to deliver malware called RustDoor. The latest advisory comes from Jamf Threat

Google Fixes GCP Composer Flaw That Could’ve Led to Remote Code Execution

16/09/2024 0 Comments 0 tags

A now-patched critical security flaw impacting Google Cloud Platform (GCP) Composer could have been exploited to achieve remote code execution on cloud servers by means of a supply chain attack

Apple Drops Spyware Case Against NSO Group, Citing Risk of Threat Intelligence Exposure

16/09/2024 0 Comments 0 tags

Apple has filed a motion to “voluntarily” dismiss its lawsuit against commercial spyware vendor NSO Group, citing a shifting risk landscape that could lead to exposure of critical “threat intelligence”