New variant of BBTok Trojan targets users of +40 banks in LATAM Security A new variant of a banking trojan, called BBTok, targets users… rooter September 25, 2023 3 min read 0
Social Media Takeover: What It Is And How To Use It Correctly Cyber Security Here, I will talk about social media takeover: what it… rooter September 24, 2023 1 min read 0
Deadglyph, a very sophisticated and unknown backdoor targets the Middle East Security Researchers discovered a previously undocumented sophisticated backdoor, named Deadglyph, used… rooter September 24, 2023 3 min read 0
Alphv group claims the hack of Clarion, a global manufacturer of audio and video equipment for cars Security The Alphv ransomware group claims to have hacked Clarion, the global… rooter September 24, 2023 3 min read 0
Security Affairs newsletter Round 438 by Pierluigi Paganini – International edition Security A new round of the weekly SecurityAffairs newsletter arrived! Every… rooter September 24, 2023 4 min read 0
Six Tips to Ensure a Strong Patch Management Strategy Cyber Security By Ashley Leonard, CEO and Founder, Syxsense The proliferation of… rooter September 24, 2023 1 min read 0
National Student Clearinghouse data breach impacted approximately 900 US schools Security U.S. educational nonprofit organization National Student Clearinghouse disclosed a data… rooter September 24, 2023 3 min read 0
ESET’s cutting-edge threat research at LABScon – Week in security with Tony Anscombe Security Two ESET malware researchers took to the LABScon stage this… rooter September 23, 2023 1 min read 0
Government of Bermuda blames Russian threat actors for the cyber attack Security The Government of Bermuda believes that the recent cyberattack against… rooter September 23, 2023 3 min read 0
Triple Tactics Cyber Security How APIs are being Targeted with Trinity Attacks By Andy… rooter September 23, 2023 1 min read 0