Browsing: #DataProtection
Cybersecurity never slows down. Every week brings new threats, new vulnerabilities, and new lessons for defenders. For security and IT…
When Attackers Are Hired: Today’s New Identity Crisis What if the star engineer you just hired is actually an attacker…
The threat actors of Russian origin probably stem from a new set of attacks targeting Kazakhstan’s energy sector. The activity,…
September 6, 2025Ravi LakshmananSoftware Security/Cryptocurrency In the NPM package registry, a new set of four malicious packages has been discovered…
The Federal Civil Enforcement Division (FCEB) agency is advised to update its Sitecore instances by September 25, 2025. The vulnerability…
The Malware-as-a-Service (MAAS) framework and the threat actor behind the loader known as CastleLoader have also developed a remote access…
September 5th, 2025Ravi LakshmananVulnerability/Enterprise Security Critical security vulnerabilities affecting SAP S/4HANA, the Enterprise Resource Planning (ERP) software, are subject to…
September 5th, 2025Hacker NewsPentest/Security Operations Pentesting is one of the most effective ways to identify real-world security weaknesses before your…
September 5th, 2025Ravi LakshmananMalware/Cryptocurrency Cybersecurity researchers are flagging new malware campaigns that leverage scalable vector graphics (SVG) files as part…
September 4, 2025Ravi LakshmananCybersecurity/Malware The Russian state-sponsored hacking group tracked as APT28 is attributed to a new Microsoft Outlook Backdoor…