With each passing year, hackers and cyber criminals of all kinds are becoming more sophisticated, malicious, and greedy conducting brazen…
Browsing: Malware and Vulnerabilities
Securi researchers are reporting that The Parrot traffic direction system (TDS) that came to light earlier this year on more…
As reported by BBC News, digital fingerprints of a million images of child sexual abuse have been created, the Internet…
EnemyBot, a botnet based on code from multiple malware pieces, is expanding its reach by quickly adding exploits for recently…
Researchers at IBM’s X-Force team are reporting a 94% reduction in the duration of an enterprise ransomware attack from 2019…
In Part 1 published by Information Security Buzz 25th May 2022, the article considered aspects of historic threats posed by…
Whilst the conceptual and academic discussions around dangerous forms of code have been on the agenda of decades past, it…
The benefits of using technology to manage third-party risk are not lost on compliance professionals. When you consider the growing…
For about a decade now, I have both practiced and taught, what has, up to 2022, seemingly been considered a…
As many readers of Information Security Buzz articles may already be aware, I have had published two articles about ‘Trust’…