3CX hack highlights risk of cascading software supply-chain compromises News At the end of March, an international VoIP software company… rooter April 21, 2023 1 min read 0
Cybercriminals Abusing an Abandoned WordPress Plugin for Malicious Code Injection Cyber Security Threat actors found a new method to inject malicious code… rooter April 21, 2023 1 min read 0
Capita Says Hackers May Have Snagged Customer and Employee Data in Recent Cyberattack News Outsourcing giant Capita has issued a statement confirming that hackers… rooter April 21, 2023 1 min read 0
Cisco fixed critical flaws in the Industrial Network Director and Modeling Labs solutions News Cisco released security updates to address critical security flaws in… rooter April 21, 2023 3 min read 0
Hackers Exploit Abandoned WordPress Plugin ‘Eval PHP’ to Compromise Websites News Cybersecurity firm Sucuri has uncovered a new wave of attacks… rooter April 21, 2023 1 min read 0
Is it possible to go through daily life without companies collecting your data? 3 VPN features that help you do that News Need for privacy. 3 VPN features that help you escape… rooter April 21, 2023 1 min read 0
Intro to phishing: simulating attacks to build resiliency News Phishing attacks are a major threat to organizations, they remain… rooter April 21, 2023 11 min read 0
Millions of Records With Sensitive Data Leaked by ICICI Bank Cyber Security ICICI Bank, an Indian multinational valued at more than $76… rooter April 21, 2023 1 min read 0
Cisco and VMware Release Security Updates to Patch Critical Flaws in their Products News Cisco and VMware have released security updates to address critical… rooter April 21, 2023 1 min read 0
Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack Security Similarities with newly discovered Linux malware used in Operation DreamJob… rooter April 21, 2023 1 min read 0