New Wi-Fi Protocol Security Flaw Affecting Linux, Android and iOS Devices News A group of academics from Northeastern University and KU Leuven… rooter March 30, 2023 1 min read 0
How To Get AWS Cloud Certification Cyber Security Are you looking to take the next step in your… rooter March 30, 2023 1 min read 0
DXC Technology says global network is not compromised following Latitude Financial breach News Soon after Latitude Financial revealed it suffered a cyber attack,… rooter March 30, 2023 1 min read 0
GDPR Article 17: What Is the Right to Erasure? Cyber Security Article 17 of the GDPR (General Data Protection Regulation) plays… rooter March 30, 2023 5 min read 0
Cyberstorage: Leveraging the Multi-Cloud to Combat Data Exfiltration News Multi-cloud data storage, once merely a byproduct of the great… rooter March 30, 2023 1 min read 0
AlienFox Malware Targets API Keys and Secrets from AWS, Google, and Microsoft Cloud Services News A new “comprehensive toolset” called AlienFox is being distributed on Telegram as… rooter March 30, 2023 1 min read 0
APT43: A New Cyberthreat From North Korea Cyber Security A new North Korean cyber operator has been attributed to… rooter March 30, 2023 1 min read 0
The U.K. Police Hunts Cybercriminals with Fake DDoS-as-a-service Sites Cyber Security The National Crime Agency (NCA) from the U.K. launched several… rooter March 30, 2023 1 min read 0
Hacker Exploits SafeMoon ‘Burn’ Bug, Steals $8.9 Million From Liquidity Pool News An unknown threat actor abused a newly created ”burn” function… rooter March 30, 2023 1 min read 0
3CX Desktop App Targeted in Supply Chain Cyber Attack, Affecting Millions of Users News 3CX said it’s working on a software update for its desktop app… rooter March 30, 2023 1 min read 0