Israel and US to Invest $3.85 Million in projects for critical infrastructure protection through the BIRD Cyber Program

2 years ago

Israel and US government agencies announced the BIRD Cyber Program, an investment of roughly $4M in projects to enhance the…

N. Korean Kimsuky APT targets S. Korea-US military exercises

2 years ago

North Korea-linked APT Kimsuky launched a spear-phishing campaign targeting US contractors working at the war simulation centre. North Korea-linked APT…

Four Juniper Junos OS flaws can be chained to remotely hack devices

2 years ago

Juniper Networks addressed multiple flaws in the J-Web component of Junos OS that could be chained to achieve remote code…

Security Affairs newsletter Round 433 by Pierluigi Paganini – International edition

2 years ago

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…

Cybersecurity: CASB vs SASE

2 years ago

Understanding cybersecurity aspects addressed by Cloud Access Security Broker (CASB) and Secure Access Service Edge (SASE) In an increasingly digital…

Over 3,000 Android Malware spotted using unsupported/unknown compression methods to avoid detection

2 years ago

Threat actors are using Android Package (APK) files with unsupported compression methods to prevent malware analysis. On June 28th, researchers…

WinRAR flaw enables remote code execution of arbitrary code

2 years ago

A flaw impacting the file archiver utility for Windows WinRAR can allow the execution of commands on a computer by…

#OpFukushima: Anonymous group protests against the plan to dump Fukushima RADIOACTIVE wastewater into Pacific

2 years ago

#OpFukushima: The famous collective Anonymous has launched cyberattacks against Japan nuclear websites over Fukushima water plan. The hacker collective Anonymous…

Massive phishing campaign targets users of the Zimbra Collaboration email server

2 years ago

A massive social engineering campaign is targeting users of the Zimbra Collaboration email server to steal their login credentials. ESET…

Africa Cyber Surge II law enforcement operation has led to the arrest of 14 suspects

2 years ago

An international law enforcement operation across 25 African countries has led to the arrest of 14 cybercriminals. A coordinated law…

This website uses cookies.