New Threat: Stealthy HeadCrab Malware Compromised Over 1,200 Redis Servers
At least 1,200 Redis database servers worldwide have been corralled into a botnet using an "elusive and severe threat" dubbed HeadCrab since early September 2021. "This advanced threat actor utilizes a state-of-the-art, custom-made malware that is undete
02-02-2023 12:17

Researchers Uncover New Bugs in Popular ImageMagick Image Processing Utility
Cybersecurity researchers have disclosed details of two security flaws in the open source ImageMagick software that could potentially lead to a denial-of-service (DoS) and information disclosure. The two issues, which were identified by Latin American cy
02-02-2023 01:29

The headache of changing passwords
Change Your Password Day — an annual reminder of just how bad passwords really are. The post appeared first on .
01-02-2023 21:59

New cybersecurity BEC attack mimics vendors
A new business email attack threat actor is using a stealth tactic to avoid giveaways of typical social engineering attacks. Learn the best defense for protecting your company. The post appeared first on .
01-02-2023 20:32

OneNote documents spread malware in several countries
A new phishing campaign abuses OneNote documents to infect computers with the infamous AsyncRAT malware, targeting users in the U.K., Canada and the U.S. The post appeared first on .
01-02-2023 20:03

Experts Warn of 'Ice Breaker' Cyberattacks Targeting Gaming and Gambling Industry
A new attack campaign has targeted the gaming and gambling sectors since at least September 2022, just months prior to the ICE London 2023 gaming industry trade fair event that's scheduled next week. Israeli cybersecurity company Security Joes is trackin
01-02-2023 19:26

Malicious NPM, PyPI Packages Stealing User Information
Security researchers are warning of a new wave of malicious NPM and PyPI packages designed to steal user information and download additional payloads. The post appeared first on .
01-02-2023 16:41

VMware Confirms Exploit Code Released for Critical vRealize Logging Vulnerabilities
VMware confirms the publication of exploit code and urged VMware vRealize Log Insight users to implement mitigations immediately. The post appeared first on .
01-02-2023 16:34

98% of Firms Have a Supply Chain Relationship That Has Been Breached: Analysis
A new report found that 98% of organizations have a relationship with a third party that has been breached, while more than 50% have an indirect relationship with more than 200 fourth parties that have been breached. The post appeared first on .
01-02-2023 16:26

New SH1MMER Exploit for Chromebook Unenrolls Managed ChromeOS Devices
A new exploit has been devised to "unenroll" enterprise- or school-managed Chromebooks from administrative control. Enrolling ChromeOS devices makes it possible to enforce device policies as set by the organization via the Google Admin console, including
01-02-2023 16:16

Auditing Kubernetes with Open Source SIEM and XDR
Container technology has gained traction among businesses due to the increased efficiency it provides. In this regard, organizations widely use Kubernetes for deploying, scaling, and managing containerized applications. Organizations should audit Kuberne
01-02-2023 15:56

Prilex PoS Malware Evolves to Block Contactless Payments to Steal from NFC Cards
The Brazilian threat actors behind an advanced and modular point-of-sale (PoS) malware known as Prilex have reared their head once again with new updates that allow it to block contactless payment transactions. Russian cybersecurity firm Kaspersky said i
01-02-2023 15:55

Dutch, European Hospitals ‘Hit by Pro-Russian Hackers’
Dutch cyber authorities said several hospital websites in the Netherlands and Europe were likely targeted by a pro-Kremlin hacking group because of their countries' support for Ukraine. The post appeared first on .
01-02-2023 15:18

Gem Security Gets $11 Million Seed Investment for Cloud Incident Response Platform 
Israeli venture group Team8 has bankrolled an $11 million seed-stage investment in Gem Security. The post appeared first on .
01-02-2023 15:00

Ransomware Leads to Nantucket Public Schools Shutdown
Nantucket’s public schools shut its doors to students and teachers after a data encryption and extortion attack on its computer systems. The post appeared first on .
01-02-2023 14:32

Stop, Collaborate and Listen: Disrupting Cybercrime Networks Requires Private-Public Cooperation and Information Sharing
No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base. The post appeared first on .
01-02-2023 13:31

Boxx Insurance Raises $14.4 Million in Series B Funding
Cyberinsurance and protection firm Boxx Insurance raises $14.4 million in a Series B funding round led by Zurich Insurance. The post appeared first on .
01-02-2023 13:28

Prilex PoS Malware Blocks NFC Transactions to Steal Credit Card Data
The Prilex point-of-sale (PoS) malware has been modified to block contactless transactions to force the insertion of credit cards and steal their information. The post appeared first on .
01-02-2023 12:32

30k Internet-Exposed QNAP NAS Devices Affected by Recent Vulnerability
Censys finds 30,000 internet-exposed QNAP appliances that are likely affected by a recently disclosed critical code injection vulnerability. The post appeared first on .
01-02-2023 12:10

Hackers Abused Microsoft's "Verified Publisher" OAuth Apps to Breach Corporate Email Accounts
Microsoft on Tuesday said it took steps to disable fake Microsoft Partner Network (MPN) accounts that were used for creating malicious OAuth applications as part of a phishing campaign designed to breach organizations' cloud environments and steal email.
01-02-2023 11:00

Less is more: Conquer your digital clutter before it conquers you
Lose what you don’t use and other easy ways to limit your digital footprint and strengthen your online privacy and security The post appeared first on
01-02-2023 10:30

Additional Supply Chain Vulnerabilities Uncovered in AMI MegaRAC BMC Software
Two more supply chain security flaws have been disclosed in AMI MegaRAC Baseboard Management Controller (BMC) software, nearly two months after three security vulnerabilities were brought to light in the same product. Firmware security firm Eclypsium sai
01-02-2023 08:44

You Don't Know Where Your Secrets Are
Do you know where your secrets are? If not, I can tell you: you are not alone. Hundreds of CISOs, CSOs, and security leaders, whether from small or large companies, don't know either. No matter the organization's size, the certifications, tools, people,
31-01-2023 18:16

CIOs hold greater organizational leadership status
Foundry’s study found the role has been significantly elevated because of the economy, and CIOs are recognized as strategic business partners by their LOB peers. The post appeared first on .
31-01-2023 17:48

New Report Reveals NikoWiper Malware That Targeted Ukraine Energy Sector
The Russia-affiliated Sandworm used yet another wiper malware strain dubbed NikoWiper as part of an attack that took place in October 2022 targeting an energy sector company in Ukraine. "The NikoWiper is based on SDelete, a command line utility from Micr
31-01-2023 16:38

Researchers Uncover Packer Used by Several Malware to Evade Detection for 6 Years
A shellcode-based packer dubbed TrickGate has been successfully operating without attracting notice for over six years, while enabling threat actors to deploy a wide range of malware such as TrickBot, Emotet, AZORult, Agent Tesla, FormBook, Cerber, Maze,
31-01-2023 16:09

IT staff systems and data access policy
IT pros typically have access to company servers, network devices and data so they can perform their jobs. However, that access entails risk, including exposure of confidential information and interruption in essential business services. This policy from
31-01-2023 11:00

ESET APT Activity Report T3 2022
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in T3 2022 The post appeared first on
31-01-2023 10:30

QNAP Fixes Critical Vulnerability in NAS Devices with Latest Security Updates
Taiwanese company QNAP has released updates to remediate a critical security flaw affecting its network-attached storage (NAS) devices that could lead to arbitrary code injection. Tracked as CVE-2022-27596, the vulnerability is rated 9.8 out of a maximum
31-01-2023 09:36

GitHub Breach: Hackers Stole Code-Signing Certificates for GitHub Desktop and Atom
GitHub on Monday disclosed that unknown threat actors managed to exfiltrate encrypted code signing certificates pertaining to some versions of GitHub Desktop for Mac and Atom apps. As a result, the company is taking the step of revoking the exposed certi
31-01-2023 09:07

Get nine ethical hacking courses for just $30
Learn some of today's most popular attacks and how to mitigate them with The All-in-One Ethical Hacking & Penetration Testing Bundle. The post appeared first on .
30-01-2023 17:00

Titan Stealer: A New Golang-Based Information Stealer Malware Emerges
A new Golang-based information stealer malware dubbed Titan Stealer is being advertised by threat actors through their Telegram channel. "The stealer is capable of stealing a variety of information from infected Windows machines, including credential dat
30-01-2023 16:56

Unphishable mobile MFA through hardware keys
With Azure AD and FIDO security keys, you can make MFA more secure and avoid having to provision certificates on everyone’s phones. The post appeared first on .
30-01-2023 15:07

Realtek Vulnerability Under Attack: Over 134 Million Attempts to Hack IoT Devices
Researchers are warning about a spike in exploitation attempts weaponizing a now-patched critical remote code execution flaw in Realtek Jungle SDK since the start of August 2022. According to Palo Alto Networks Unit 42, the ongoing campaign is said to ha
30-01-2023 15:00

Zero-trust security: A cheat sheet (free PDF)
Current cybersecurity practices are woefully unprepared to meet the complexities of modern networks. Cloud services, remote users, personally-owned devices, mobile company assets and other forms of tech regularly move from outside the network in, and a o
30-01-2023 11:00

Gootkit Malware Continues to Evolve with New Components and Obfuscations
The threat actors associated with the Gootkit malware have made "notable changes" to their toolset, adding new components and obfuscations to their infection chains. Google-owned Mandiant is monitoring the activity cluster under the moniker UNC2565, noti
29-01-2023 11:17

Microsoft Urges Customers to Secure On-Premises Exchange Servers
Microsoft is urging customers to keep their Exchange servers updated as well as take steps to bolster the environment, such as enabling Windows Extended Protection and configuring certificate-based signing of PowerShell serialization payloads. "Attackers
28-01-2023 16:12

Eliminating SaaS Shadow IT is Now Available via a Self-Service Product, Free of Charge
The use of software as a service (SaaS) is experiencing rapid growth and shows no signs of slowing down. Its decentralized and easy-to-use nature is beneficial for increasing employee productivity, but it also poses many security and IT challenges. Keepi
28-01-2023 16:11

ISC Releases Security Patches for New BIND DNS Software Vulnerabilities
The Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the Berkeley Internet Name Domain (BIND) 9 Domain Name System (DNS) software suite that could lead to a denial-of-service (DoS) condition. "A remot
28-01-2023 13:25

Ukraine Hit with New Golang-based 'SwiftSlicer' Wiper Malware in Latest Cyber Attack
Ukraine has come under a fresh cyber onslaught from Russia that involved the deployment of a previously undocumented Golang-based data wiper dubbed SwiftSlicer. ESET attributed the attack to Sandworm, a nation-state group linked to Military Unit 74455 of
28-01-2023 11:19

Eliminating SaaS Shadow IT is Now Available via a Self-Service Product, Free of Charge
The use of software as a service (SaaS) is experiencing rapid growth and shows no signs of slowing down. Its decentralized and easy-to-use nature is beneficial for increasing employee productivity, but it also poses many security and IT challenges. Keepi
28-01-2023 04:00

FBI takes down Hive ransomware group
Working with international law enforcement, the FBI said it has seized control of the servers the Hive group uses to communicate with members. The post appeared first on .
27-01-2023 19:47

Experts Uncover the Identity of Mastermind Behind Golden Chickens Malware Service
Cybersecurity researchers have discovered the real-world identity of the threat actor behind Golden Chickens malware-as-a-service, who goes by the online persona "badbullzvenom." eSentire's Threat Response Unit (TRU), in an exhaustive report published fo
27-01-2023 19:20

Are you in control of your personal data? – Week in security with Tony Anscombe
Data Privacy Week is a reminder to protect your data – all year round. Here are three privacy-boosting habits you can start today. The post appeared first on
27-01-2023 18:15

How to use Microsoft KQL for SIEM insight
Microsoft’s cloud-hosted SIEM software comes with a suite of powerful analytics tools designed to read logs and find anomalies in the data haystack. The post appeared first on .
27-01-2023 18:05

SwiftSlicer: New destructive wiper malware strikes Ukraine
Sandworm continues to conduct attacks against carefully chosen targets in the war-torn country The post appeared first on
27-01-2023 17:45

Researchers Discover New PlugX Malware Variant Spreading via Removable USB Devices
Cybersecurity researchers have uncovered a PlugX sample that employs sneaky methods to infect attached removable USB media devices in order to propagate the malware to additional systems. "This PlugX variant is wormable and infects USB devices in such a
27-01-2023 17:23

3 Lifehacks While Analyzing Orcus RAT in a Malware Sandbox
Orcus is a Remote Access Trojan with some distinctive characteristics. The RAT allows attackers to create plugins and offers a robust core feature set that makes it quite a dangerous malicious program in its class. RAT is quite a stable type that always
27-01-2023 16:25

British Cyber Agency Warns of Russian and Iranian Hackers Targeting Key Industries
The U.K. National Cyber Security Centre (NCSC) on Thursday warned of spear-phishing attacks mounted by Russian and Iranian state-sponsored actors for information-gathering operations. "The attacks are not aimed at the general public but targets in specif
27-01-2023 16:07

Critical Vulnerability Impacts Over 120 Lexmark Printers
Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published. The post appeared first on .
27-01-2023 14:51

Here’s how IT budgets should fill cybersecurity moats in 2023
TechRepublic speaks with Carlos Morales of Neustar Security Services on the best ways for companies to spend on cybersecurity — even if their budgets are tighter. The post appeared first on .
27-01-2023 14:25

BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
The latest BIND updates patch multiple remotely exploitable vulnerabilities that could lead to denial-of-service (DoS). The post appeared first on .
27-01-2023 14:06

Industry Reactions to Hive Ransomware Takedown: Feedback Friday
Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement. The post appeared first on .
27-01-2023 12:55

Microsoft Urges Customers to Patch Exchange Servers
Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks. The post appeared first on .
27-01-2023 12:35

Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
Iranian APT Moses Staff is leaking data stolen from Saudi Arabia government ministries under the recently created Abraham's Ax persona The post appeared first on .
27-01-2023 12:23

US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
US government reminds the public that a reward of up to $10 million is offered for information on cybercriminals, including members of the Hive operation. The post appeared first on .
27-01-2023 09:37

Hive Ransomware Infrastructure Seized in Joint International Law Enforcement Effort
The infrastructure associated with the Hive ransomware-as-a-service (RaaS) operation has been seized as part of a coordinated law enforcement effort involving 13 countries. "Law enforcement identified the decryption keys and shared them with many of the
26-01-2023 21:50

Google Takes Down 50,000 Instances of Pro-Chinese DRAGONBRIDGE Influence Operation
Google on Thursday disclosed it took steps to dismantle over 50,000 instances of activity orchestrated by a pro-Chinese influence operation known as DRAGONBRIDGE in 2022. "Most DRAGONBRIDGE activity is low quality content without a political message, pop
26-01-2023 21:36

Researchers Release PoC Exploit for Windows CryptoAPI Bug Discovered by NSA
Proof-of-concept (Poc) code has been released for a now-patched high-severity security flaw in the Windows CryptoAPI that the U.S. National Security Agency (NSA) and the U.K. National Cyber Security Centre (NCSC) reported to Microsoft last year. Tracked
26-01-2023 20:22

Cyberattacks Target Websites of German Airports, Admin
Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet The post appeared first on .
26-01-2023 20:17

Researchers Uncover Connection b/w Moses Staff and Emerging Abraham's Ax Hacktivists Group
New research has linked the operations of a politically motivated hacktivist group known as Moses Staff to another nascent threat actor named Abraham's Ax that emerged in November 2022. This is based on "several commonalities across the iconography, vide
26-01-2023 20:04

Is Once-Yearly Pen Testing Enough for Your Organization?
Any organization that handles sensitive data must be diligent in its security efforts, which include regular pen testing. Even a small data breach can result in significant damage to an organization's reputation and bottom line. There are two main reason
26-01-2023 19:51

US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation. The post appeared first on .
26-01-2023 17:32

Tenable Launches $25 Million Early-Stage Venture Fund
Tenable has launched a $25 million venture fund to place bets on early-stage startups in the exposure management space. The post appeared first on .
26-01-2023 15:29

820k Impacted by Data Breach at Zacks Investment Research
Zacks Investment Research is informing 820,000 individuals that their personal data was compromised in a data breach. The post appeared first on .
26-01-2023 14:49

Mapping Threat Intelligence to the NIST Compliance Framework Part 2
How threat intelligence is critical when justifying budget for GRC personnel, and for threat intelligence, incident response, security operations and CISO buyers. The post appeared first on .
26-01-2023 14:29

Hive Ransomware Operation Shut Down by Law Enforcement
The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries. The post appeared first on .
26-01-2023 14:17

US Government Agencies Warn of Malicious Use of Remote Management Software
CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts. The post appeared first on .
26-01-2023 12:50

Securing IoT with Microsoft Defender for IoT sensors
Protecting the devices that run your production facilities is increasingly important. How can we secure single-purpose hardware? The post appeared first on .
26-01-2023 12:07

UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
The UK’s NCSC has issued a security advisory to warn about spearphishing campaigns conducted by two unrelated Russian and Iranian hacker groups. The post appeared first on .
26-01-2023 11:58

PY#RATION: New Python-based RAT Uses WebSocket for C2 and Data Exfiltration
Cybersecurity researchers have unearthed a new attack campaign that leverages a Python-based remote access trojan (RAT) to gain control over compromised systems since at least August 2022. "This malware is unique in its utilization of WebSockets to avoid
26-01-2023 11:31

Chinese Hackers Adopting Open Source ‘SparkRAT’ Tool
Chinese threat actor DragonSpark has been using the SparkRAT open source backdoor in attacks targeting East Asian organizations. The post appeared first on .
26-01-2023 11:30

Dozens of Cybersecurity Companies Announced Layoffs in Past Year
Tens of cybersecurity companies have announced cutting staff over the past year, in some cases significant portions of their global workforce. The post appeared first on .
26-01-2023 11:16

Why your data is more valuable than you may realize
The data trail you leave behind whenever you're online is bigger – and more revealing – than you may think The post appeared first on
26-01-2023 10:30

U.S. Federal Agencies Fall Victim to Cyber Attack Utilizing Legitimate RMM Software
At least two federal agencies in the U.S. fell victim to a "widespread cyber campaign" that involved the use of legitimate remote monitoring and management (RMM) software to perpetuate a phishing scam. "Specifically, cyber criminal actors sent phishing e
26-01-2023 09:57

How to force Portainer to use HTTPS and upload your SSL certificates for heightened security
If Portainer is your go-to GUI for Docker and Kubernetes, you should consider adding a bit of extra security to the deployment. The post appeared first on .
25-01-2023 23:34

Over 4,500 WordPress Sites Hacked to Redirect Visitors to Sketchy Ad Pages
A massive campaign has infected over 4,500 WordPress websites as part of a long-running operation that's been believed to be active since at least 2017. According to GoDaddy-owned Sucuri, the infections involve the injection of obfuscated JavaScript host
25-01-2023 21:41

Survey: Cybersecurity budgets aren’t matching cybersecurity challenges
A new study finds that due to the growing threat surface from hybrid work and third-party vendors, only half of organizations have the budget to meet current cybersecurity needs. The post appeared first on .
25-01-2023 18:43

The Definitive Browser Security Checklist
Security stakeholders have come to realize that the prominent role the browser has in the modern corporate environment requires a re-evaluation of how it is managed and protected. While not long-ago web-borne risks were still addressed by a patchwork of
25-01-2023 18:30

Malicious Prompt Engineering With ChatGPT
The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad. The post appeared first on .
25-01-2023 17:05

Learn cutting-edge ethical hacking techniques for just $39.99
The 2023 Masters in Cyber Security Certification Bundle includes full online training prep for key cybersecurity exams. The post appeared first on .
25-01-2023 16:27

The risks of 5G security
Unless you've been living under a rock for the past decade, you’ve probably heard of 5G telecommunications. But what is it? The post appeared first on .
25-01-2023 16:23

North Korean Hackers Turn to Credential Harvesting in Latest Wave of Cyberattacks
A North Korean nation-state group notorious for crypto heists has been attributed to a new wave of malicious email attacks as part of a "sprawling" credential harvesting activity targeting a number of industry verticals, marking a significant shift in it
25-01-2023 16:11

LastPass Parent Company GoTo Suffers Data Breach, Customers' Backups Compromised
LastPass-owner GoTo (formerly LogMeIn) on Tuesday disclosed that unidentified threat actors were able to steal encrypted backups of some customers' data along with an encryption key for some of those backups in a November 2022 incident. The breach, which
25-01-2023 13:13

VMware Releases Patches for Critical vRealize Log Insight Software Vulnerabilities
VMware on Tuesday released software to remediate four security vulnerabilities affecting vRealize Log Insight (aka Aria Operations for Logs) that could expose users to remote code execution attacks. Two of the flaws are critical, carrying a severity rati
25-01-2023 12:37

Mastodon vs. Twitter: Know the differences
Looking for an alternative to Twitter and thinking about joining the folks flocking to Mastodon? Here’s how the two platforms compare to each other. The post appeared first on
25-01-2023 10:30

How hackers stole the personal data of 37 million T-Mobile customers
The criminals took advantage of an API to grab personal details such as customer names, billing addresses, email addresses, phone numbers, dates of birth, and T-Mobile account numbers. The post appeared first on .
24-01-2023 20:41

Recent rise in SEO poisoning attacks compromise brand reputations
A new research report from SentinelOne exposes a SEO poisoning attack campaign that hijacks brand names in paid search ads. The post appeared first on .
24-01-2023 20:40

Chinese Hackers Utilize Golang Malware in DragonSpark Attacks to Evade Detection
Organizations in East Asia are being targeted by a likely Chinese-speaking actor dubbed DragonSpark while employing uncommon tactics to go past security layers. "The attacks are characterized by the use of the little known open source SparkRAT and malwar
24-01-2023 20:07

10 cybersecurity predictions for tech leaders in 2023
From ransomware to third-party vendor security to software-defined perimeters, these cybersecurity topics should be on IT leaders’ radar. The post appeared first on .
24-01-2023 18:06

FBI Says North Korean Hackers Behind $100 Million Horizon Bridge Crypto Theft
The U.S. Federal Bureau of Investigation (FBI) on Monday confirmed that North Korean threat actors were responsible for the theft of $100 million in cryptocurrency assets from Harmony Horizon Bridge in June 2022. The law enforcement agency attributed the
24-01-2023 17:28

Get lifetime access to this feature-rich VPN for just $60
The VPN is now on sale for a limited time. The post appeared first on .
24-01-2023 17:24

Companies slow to “mask up” with zero trust cybersecurity protocols
A new study by Gartner predicts that by 2026 just 10% of companies will have zero-trust protocols in place against cybersecurity exploits. The post appeared first on .
24-01-2023 17:16

Security Navigator Research: Some Vulnerabilities Date Back to the Last Millennium
Vulnerability analysis results in Orange Cyberdefenses' Security Navigator show that some vulnerabilities first discovered in 1999 are still found in networks today. This is concerning. Age of VOC findings Our Vulnerability Scans are performed on a recur
24-01-2023 17:03

Emotet Malware Makes a Comeback with New Evasion Techniques
The Emotet malware operation has continued to refine its tactics in an effort to fly under the radar, while also acting as a conduit for other dangerous malware such as Bumblebee and IcedID. Emotet, which officially reemerged in late 2021 following a coo
24-01-2023 16:33

Apple Issues Updates for Older Devices to Fix Actively Exploited Vulnerability
Apple has backported fixes for a recently disclosed critical security flaw affecting older devices, citing evidence of active exploitation. The issue, tracked as CVE-2022-42856, is a type confusion vulnerability in the WebKit browser engine that could re
24-01-2023 14:51

Facebook Introduces New Features for End-to-End Encrypted Messenger App
Meta Platforms on Monday announced that it has started to expand global testing of end-to-end encryption (E2EE) in Messenger chats by default. "Over the next few months, more people will continue to see some of their chats gradually being upgraded with a
24-01-2023 11:14

5 valuable skills your children can learn by playing video games
Gaming can help your children build and sharpen a range of life skills that will stand them in good stead in the future The post appeared first on
24-01-2023 10:30

Data Privacy Week 2023: Virtual events and webinars to attend
The National Cybersecurity Alliance's second annual Data Privacy Week is January 22-28, 2023. Learn how you can participate in virtual events. The post appeared first on .
23-01-2023 21:36

Report: Cyberespionage threat actor exploits CVE-2022-42475 FortiOS vulnerability
A possible Chinese cyberespionage actor has exploited a FortiOS vulnerability to successfully compromise companies. The post appeared first on .
23-01-2023 20:53

source : hackernews, securityweek, techrepublicsecurity, welivesecurity