“My Slice”, an Italian adaptive phishing campaign Security Adaptive phishing campaigns are emerging as an increasingly sophisticated threat… rooter January 22, 2024 4 min read 0
AI Bots on X (Twitter) Security You can find them by searching for OpenAI chatbot warning… rooter January 22, 2024 1 min read 0
Fostering Total Trust with A ‘Zero-Trust’ Approach in Financial Services Cyber Security By Stefan Auerbach, CEO, Utimaco Despite annual spending on cybersecurity… rooter January 22, 2024 1 min read 0
Threat actors exploit Apache ActiveMQ flaw to deliver the Godzilla Web Shell Security Researchers warn of a spike in attacks exploiting a now-patched… rooter January 22, 2024 3 min read 0
ECC or RSA – Which One You’d Choose for Web Security? Security ECC vs. RSA: Learn how to distinguish between the most… rooter January 22, 2024 1 min read 0
Cybercriminals leaked massive volumes of stolen PII data from Thailand in Dark Web Security Resecurity researchers warn of massive leak of stolen Thai personally… rooter January 22, 2024 2 min read 0
Backdoored pirated applications targets Apple macOS users Security Researchers warned that pirated applications have been employed to deliver… rooter January 22, 2024 3 min read 0
LockBit ransomware gang claims the attack on the sandwich chain Subway Security The LockBit ransomware gang claimed to have hacked Subway, the… rooter January 21, 2024 1 min read 0
Security Affairs newsletter Round 455 by Pierluigi Paganini – INTERNATIONAL EDITION Security A new round of the weekly SecurityAffairs newsletter arrived! Every… rooter January 21, 2024 4 min read 0
Webinar: Join us for the latest in API Threats on January 24, 2024 Security In today’s complex digital landscape, the security of APIs has… rooter January 21, 2024 2 min read 0