Internet Security

ZuRu Malware Targets macOS Users with Trojanized Termius App
Endpoint & Device Security ZuRu Malware Targets macOS Users with Trojanized Termius App

Could your trusted apps be silently compromising your system security? Trusted applications, like the widely-used Termius app for managing SSH clients and servers, are an essential component of daily digital interactions. However, the recent discovery of a trojanized version exploits this trust,

Ahold Delhaize Cyberattack Exposes Data of 2 Million Plus Individuals
Data Protection & Privacy Ahold Delhaize Cyberattack Exposes Data of 2 Million Plus Individuals

What would you do if your most sensitive data—your Social Security number, health records, and bank account details—fell into the wrong hands? This alarming situation has become a reality for over 2 million individuals affected by a recent significant cyberattack on Ahold Delhaize USA. The company,

Non-Human Identity Management – Review
Infrastructure & Network Security Non-Human Identity Management – Review

Non-Human Identity Management (NHI) has emerged as a pivotal development in the realm of cybersecurity, reshaping how organizations manage the vast landscape of non-human digital identities. With this trend gaining traction, there's an urgent need to evaluate its progress. This overview examines

Adaptive AI: The Future of Security Operations Centers
Endpoint & Device Security Adaptive AI: The Future of Security Operations Centers

The evolution of Security Operations Centers (SOCs) has been marked by the rapid integration of artificial intelligence to combat increasingly sophisticated cybersecurity threats. Traditional methods, relying on pre-trained AI models, have proved inadequate in addressing dynamic and unpredictable

Trojanized SonicWall VPN App Steals Users' Sensitive Data
Identity & Access Management Trojanized SonicWall VPN App Steals Users' Sensitive Data

In the ever-persistent battle against cybercrime, a recent incident has once again spotlighted the vulnerabilities faced by software users worldwide. Attackers have successfully tampered with SonicWall's NetExtender VPN application to craft a trojanized version that stealthily siphons off sensitive

How Can Companies Defend Against Scattered Spider's Threat?
Identity & Access Management How Can Companies Defend Against Scattered Spider's Threat?

The cybercriminal group known as Scattered Spider poses an increasingly potent threat as it diversifies its targets across various industries using refined phishing and ransomware tactics. This shifting landscape is underscored by the revelation of over 500 phishing domains assimilated into their

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later