Internet Security

Advanced Phishing Scheme Exploits Google Tools for Attacks
Infrastructure & Network Security Advanced Phishing Scheme Exploits Google Tools for Attacks

Rupert Marais, our in-house Security specialist, dives deep into the intricacies of the recent phishing attack that exploited both Google Sites and DKIM replay tactics. This attack is notable not only for its sophistication but also for the clever manipulation of Google's infrastructure to send

How Are Cybercriminals Exploiting AI for Phishing?
Infrastructure & Network Security How Are Cybercriminals Exploiting AI for Phishing?

Artificial intelligence has become a tool exploited by cybercriminals, leading to a new wave of sophisticated phishing schemes. Such attackers are now leveraging AI to design deceptive emails, craft convincing fake websites, and use tools like the Gamma presentation platform to conduct complex

GitLab Releases Critical Security Patches for Major Vulnerabilities
Infrastructure & Network Security GitLab Releases Critical Security Patches for Major Vulnerabilities

The digital landscape has become increasingly perilous as cyber threats evolve in complexity and frequency, necessitating robust security measures from technology companies. GitLab has proactively addressed this challenge by releasing a series of critical security patches for its Community Edition

Snyk Unveils AI-Enhanced DAST Solution for API and Web Security
Infrastructure & Network Security Snyk Unveils AI-Enhanced DAST Solution for API and Web Security

Amid the ever-evolving landscape of software development and cybersecurity, Snyk Ltd. has launched a groundbreaking solution designed to streamline and bolster application security testing. The Snyk API & Web is an AI-enhanced Dynamic Application Security Testing (DAST) solution aimed at addressing

Synology DSM Vulnerability Lets Hackers Read Any File Remotely
Infrastructure & Network Security Synology DSM Vulnerability Lets Hackers Read Any File Remotely

A severe security vulnerability has been identified in Synology’s DiskStation Manager (DSM) software, alarming organizations and individuals who rely on the popular network-attached storage (NAS) solution. This vulnerability enables remote attackers to read arbitrary files through the Network File

How Are Attackers Using Docker for Novel Cryptojacking?
Infrastructure & Network Security How Are Attackers Using Docker for Novel Cryptojacking?

Out of all the services targeted by Darktrace, Docker has emerged as the most frequently attacked platform, showcasing an ongoing evolution in cyber threats with new malware strains appearing daily. This article will delve into a distinct malware attack featuring a unique obfuscation method and an

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later