Breaking the Mold: Pen Testing Solutions That Challenge the Status Quo News Malicious actors are constantly adapting their tactics, techniques, and procedures… rooter March 28, 2023 1 min read 0
Pakistan-Origin SideCopy Linked to New Cyberattack on India’s Ministry of Defence News An advanced persistent threat (APT) group that has a track… rooter March 28, 2023 1 min read 0
Stealthy DBatLoader Malware Loader Spreading Remcos RAT and Formbook in Europe News A new phishing campaign has set its sights on European… rooter March 28, 2023 1 min read 0
Security Vulnerabilities in Snipping Tools Security Both Google’s Pixel’s Markup Tool and the Windows Snipping Tool… rooter March 28, 2023 1 min read 0
White House Signs Executive Order to Restrict Commercial Spyware News On Monday, the White House signed an executive order to… rooter March 28, 2023 1 min read 0
Apple Patches ‘Actively Exploited’ Security Flaw in Older iPhones with iOS 15.7.4 News Apple is sending out security fixes across the board this… rooter March 28, 2023 1 min read 0
MacStealer macOS Malware Detection: Novel Malicious Strain Steals User Credentials from iCloud KeyChain Threats Heads up! A novel infostealer is making a splash in… rooter March 28, 2023 4 min read 0
Telecom giant Lumen suffered a ransomware attack and disclose a second incident News Telecommunications giant Lumen Technologies discovered two cybersecurity incidents, including a… rooter March 28, 2023 2 min read 0
5 ways to tell you are not CISO material News As the role of the CISO continues to grow in… rooter March 28, 2023 1 min read 0
Office of the Director of National Intelligence highlights cyber threats in 2023 Intelligence Threat Assessment News When the Office of the Director of National Intelligence (ODNI)… rooter March 28, 2023 1 min read 0