The Next Generation of RBI (Remote Browser Isolation)

The landscape of browser security has undergone significant changes over the past decade. While Browser Isolation was once considered the gold standard for protecting...

Google App Contains Joker Malware : Removed

Security scientists from Pradeo found Joker malware flooding the Play Store mimicking different applications. As uncovered through their post, they discovered six distinctive Android...

PINEAPPLE and FLUXROOT Hacker Groups Abuse Google Cloud for Credential Phishing

A Latin America (LATAM)-based financially motivated actor codenamed FLUXROOT has been observed leveraging Google Cloud serverless projects to orchestrate credential phishing activity, highlighting the...

Bumblebee Malware Returns with New Tricks, Targeting U.S. Businesses

The infamous malware loader and initial access broker known as Bumblebee has resurfaced after a four-month absence as part of a new phishing campaign...

Microsoft says it’s time for you to prevent using SMS and voice involves multi-factor...

SIM-swapping scams and other techniques pose risk to those that depend on phone-based authentication But don’t make the error of disabling MFA entirely – even...

Foxconn suffers a Ransomware attack; $34 million Ransom demanded

Foxconn endured a ransomware assault at its Mexican office over the Thanksgiving weekend, by DoppelPaymer ransomware pack. Foxconn is the biggest hardware producing organization, with...
app store

Apple App Store: What’s next?

While the Google Play Store is no stranger to malware-infected apps, the App store seems to be experiencing its first slice of it. Recently,...
Germany Politicians Hack

Hackers Leak Personal Data from Hundreds of German Politicians On Twitter

Germany has been hit with the biggest hack in its history. A group of unknown hackers has leaked highly...

Ransomware: This new variant might be subsequent big malware threat to your business

A new sort of ransomware is becoming increasingly prolific as cyber criminals address it as a preferred means of encrypting vulnerable networks in an...

Timing is Everything: The Role of Just-in-Time Privileged Access in Security Evolution

To minimize the risk of privilege misuse, a trend in the privileged access management (PAM) solution market involves implementing just-in-time (JIT) privileged access. This...

Follow Us Here!

372FansLike
332FollowersFollow
323FollowersFollow

Popular Posts