Essential Guide to Cybersecurity Compliance News SOC 2, ISO, HIPAA, Cyber Essentials – all the security… rooter October 2, 2023 1 min read 0
ShadowSyndicate: A New Cybercrime Group Linked to 7 Ransomware Families News Cybersecurity experts have shed light on a new cybercrime group… rooter October 2, 2023 1 min read 0
Microsoft is Rolling out Support for Passkeys in Windows 11 News Microsoft is officially rolling out support for passkeys in Windows… rooter October 2, 2023 1 min read 0
New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware News The three zero-day flaws addressed by Apple on September 21, 2023, were… rooter October 2, 2023 1 min read 0
Deadglyph: New Advanced Backdoor with Distinctive Malware Tactics News Cybersecurity researchers have discovered a previously undocumented advanced backdoor dubbed Deadglyph employed… rooter October 2, 2023 1 min read 0
New Report Uncovers 3 Distinct Clusters of China-Nexus Attacks on Southeast Asian Government News An unnamed Southeast Asian government has been targeted by multiple… rooter October 2, 2023 1 min read 0
From Watering Hole to Spyware: EvilBamboo Targets Tibetans, Uyghurs, and Taiwanese News Tibetan, Uyghur, and Taiwanese individuals and organizations are the targets… rooter October 2, 2023 1 min read 0
Are You Willing to Pay the High Cost of Compromised Credentials? News Weak password policies leave organizations vulnerable to attacks. But are… rooter October 2, 2023 1 min read 0
Webinar — AI vs. AI: Harnessing AI Defenses Against AI-Powered Risks News Generative AI is a double-edged sword, if there ever was… rooter October 2, 2023 1 min read 0
Ukrainian Military Targeted in Phishing Campaign Leveraging Drone Manuals News Ukrainian military entities are the target of a phishing campaign… rooter October 2, 2023 1 min read 0