A vulnerability in Windows that has been around for decades is being exploited by hackers behind a new version of…
Browsing: Phishing
It’s being reported that hackers have been using credit card stealing malware to infect popular retailers such as Zara just as the…
The Hacker’s Playbook Findings Report* reveals that cybercriminals are able to break into enterprise networks with malware on average 60%…
AI will supercharge phishing attacks AI won’t just be used by the good guys. In 2018, we will start to…
Wide spread cryptocurrency mining Cryptocurrency mining will become one of the major monetisation avenues for attackers as more and more…
Security blossoms in the boardroom Sadly, security breaches will continue to be a regular occurrence in 2018 and organisations will…
F5 Labs today released a new report, Lessons Learned from a Decade of Breaches, which researches 429 breach cases spanning 12 years, 37…
Hackers will exploit broader entry points In the coming year, we will see the attack surface growing and evolving as…
German security researcher Sabri Haddouche has discovered a set of vulnerabilities that he collectively refers to as Mailsploit, and which…
There are four major factors in cyber security that change constantly, creating meaningful impact to business and government cybersecurity programs:…