Cybersecurity CPEs: Unraveling the What, Why & How
Staying Sharp: Cybersecurity CPEs Explained Perhaps even more so than in other professional domains, cybersecurity professionals constantly face...
Azure Service Tags Vulnerability: Microsoft Warns of Potential Abuse by Hackers
Microsoft is warning about the potential abuse of Azure Service Tags by malicious actors to forge requests from...
Google Takes Down Influence Campaigns Tied to China, Indonesia, and Russia
Google has revealed that it took down 1,320 YouTube channels and 1,177 Blogger blogs as part of a...
Bypassing 2FA with phishing and OTP bots
Introduction Two-factor authentication (2FA) is a security feature we have come to expect as standard by 2024. Most...
What we learned from gaming’s big weekend
Xbox’s showcase tops off Summer Game Fest – here are some of the highlights from gaming’s big weekend....
O-type blood donors needed after London cyber-attack
The NHS says last week’s cyber-attack means blood cannot be sorted at the same frequency. Source:: BBC News...
Sticky Werewolf Expands Cyber Attack Targets in Russia and Belarus
Cybersecurity researchers have disclosed details of a threat actor known as Sticky Werewolf that has been linked to...
Scammers use fake X accounts to impersonate airlines
Holidaymakers are warned about scams where fake social media accounts are used to impersonate airlines. Source:: BBC News...
Brave says May 2024 was its biggest growth month ever
Brave browser experienced its most significant growth month ever in May 2024, now used by more than 78.95 million monthly...
Malicious VSCode extensions with millions of installs discovered
A group of Israeli researchers explored the security of the Visual Studio Code marketplace and managed to “infect”...
Malicious VSCode extensions with millions of installs discovered
A group of Israeli researchers explored the security of the Visual Studio Code marketplace and managed to “infect”...
Malicious VSCode extensions with 229M installs found on Microsoft marketplace
A group of Israeli researchers exploring the limits of VSCode security have managed to “infect” over 100 organizations...
Dead in 6 hours: How Nigerian sextortion scammers targeted my son
Jenn Buta has been campaigning since her son was targeted by sextortionists in Nigeria – a hotspot for...
New York Times source code stolen using exposed GitHub token
Internal source code and data belonging to The New York Times was leaked on the 4chan message board...
DDoS attacks target EU political parties as elections begin
Hacktivists are conducting DDoS attacks on European political parties that represent and promote strategies opposing their interests, according...
New PHP Vulnerability Exposes Windows Servers to Remote Code Execution
Details have emerged about a new critical security flaw impacting PHP that could be exploited to achieve remote...
Microsoft Revamps Controversial AI-Powered Recall Feature Amid Privacy Concerns
Microsoft on Friday said it will disable its much-criticized artificial intelligence (AI)-powered Recall feature by default and make...
LastPass says 12-hour outage caused by bad Chrome extension update
LastPass says its almost 12-hour outage yesterday was caused by a bad update to its Google Chrome extension....
Cisco steps up full-stack observability play with Splunk tie-ins
An indication of how impactful the Splunk buy could be for Cisco and its customers can be seen...
Internet insights on 2024 elections in the Netherlands, South Africa, Iceland, India, and Mexico
2024 is being called by the report). Website trends: traffic spikes from news and election results Switching to...