Managing security in the cloud through Microsoft Intune News For many years, the Group Policy feature of Microsoft’s Windows… rooter March 29, 2023 1 min read 0
DarkBit puts data from Israel’s Technion university on sale News DarkBit, the group that claimed responsibility for a ransomware attack… rooter March 29, 2023 1 min read 0
WordPress Site Security Alert: Bookly Plugin Vulnerability Discovered and Patched Cyber Security Estimated reading time: 3 minutes WordPress is a popular content… rooter March 29, 2023 3 min read 0
Trojanized TOR Browser Installers Spreading Crypto-Stealing Clipper Malware News Trojanized installers for the TOR anonymity browser are being used… rooter March 29, 2023 1 min read 0
Logitech Designed the Perfect Pair of Headphones for Kids to Use With Their Tablets News The only things guaranteed in life are death, taxes, and… rooter March 29, 2023 1 min read 0
Warning! 14 Million Customers Impacted by Latitude Financial`s Data Breach Cyber Security Latitude Financial Services, the recently breached Australian loan giant, announces… rooter March 29, 2023 1 min read 0
Compliance In The Cloud: Why IAM Is Critical Cyber Security In this post, I will show you why IAM is… rooter March 29, 2023 1 min read 0
North Korean APT43 Group Uses Cybercrime to Fund Espionage Operations News A new North Korean nation-state cyber operator has been attributed… rooter March 29, 2023 1 min read 0
THE PERILS OF RANSOMWARE : How to Save yourself from the next attack Security In recent years, ransomware attacks have increased in frequency and… rooter March 29, 2023 1 min read 0
Legacy, password-based authentication systems are failing enterprise security, says study News Authentication-related attacks grew in 2022, taking advantage of outdated, password-based… rooter March 29, 2023 1 min read 0