admin
September 15, 2022
A threat actor tracked under the moniker Webworm has been linked to bespoke Windows-based remote access trojans,...
admin
September 15, 2022
The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) on Wednesday announced sweeping sanctions against ten...
admin
September 14, 2022
The operators behind the Lornenz ransomware operation have been observed exploiting a now-patched critical security flaw in...
admin
September 14, 2022
A Linux variant of a backdoor known as SideWalk was used to target a Hong Kong university...
admin
September 14, 2022
According to the 2022 Malwarebytes Threat review, 40M Windows business computers' threats were detected in 2021. And...
admin
September 14, 2022
Palo Alto Networks Unit 42 has detailed the inner workings of a malware called OriginLogger, which has been...
admin
September 14, 2022
Tech giant Microsoft on Tuesday shipped fixes to quash 64 new security flaws across its software lineup, including one...
admin
September 14, 2022
A zero-day flaw in the latest version of a WordPress premium plugin known as WPGateway is being actively exploited...
How GRC protects the value of organizations — A simple guide to data quality and integrity
9 min read
admin
September 13, 2022
Contemporary organizations understand the importance of data and its impact on improving interactions with customers, offering quality...
admin
September 13, 2022
Government and state-owned organizations in a number of Asian countries have been targeted by a distinct group...
admin
September 13, 2022
Hackers tied to the Iranian government have been targeting individuals specializing in Middle Eastern affairs, nuclear security,...
admin
September 13, 2022
Apple has released another round of security updates to address multiple vulnerabilities in iOS and macOS, including...
admin
September 12, 2022
China has accused the U.S. National Security Agency (NSA) of conducting a string of cyberattacks aimed at...
admin
September 12, 2022
A hacktivist collective called GhostSec has claimed credit for compromising as many as 55 Berghof programmable logic controllers (PLCs)...
admin
September 12, 2022
SOC 2 may be a voluntary standard, but for today's security-conscious business, it's a minimal requirement when...
admin
September 12, 2022
A number of firmware security flaws uncovered in HP's business-oriented high-end notebooks continue to be left unpatched...
admin
September 11, 2022
Major financial and insurance companies located in French-speaking nations in Africa have been targeted over the past...
admin
September 11, 2022
A state-sponsored advanced persistent threat (APT) actor newly christened APT42 (formerly UNC788) has been attributed to over...
admin
September 11, 2022
A recent report revealed that ecommerce provider, Shopify uses particularly weak password policies on the customer-facing portion...
admin
September 10, 2022
The U.S. Treasury Department on Friday announced sanctions against Iran’s Ministry of Intelligence and Security (MOIS) and...