Interpol Says We Can’t Arrest Our Way out of Cybercrime
Reading Time: 2 minutes Cybercriminals are getting more sophisticated, enabling them to carry out more destructive and costly cybercrimes. According to Interpol’s Doug Witschi, to combat…
Reading Time: 2 minutes Cybercriminals are getting more sophisticated, enabling them to carry out more destructive and costly cybercrimes. According to Interpol’s Doug Witschi, to combat…
Reading Time: 2 minutes The Computer Emergency Response Team (CERT-In) in India has asked Indian tech companies to comply with the new set of rules required….
Reading Time: 2 minutes Chinese hackers are using updated PlugX Malware to target Russian military personnel. According to Secureworks, Bronze President is behind the attacks and…
Reading Time: 2 minutes Critical VMware RCE flaw is being exploited by advanced hackers to install backdoors. CVE-2022-22954 vulnerability affects the VMware Workspace ONE Access earlier…
Reading Time: < 1 minute According to the FBI, BlackCat ransomware breached at least 60 organizations globally as of March. The ransomware gang has been the first…
Reading Time: 2 minutes According to Palo Alto Networks, Amazon’s hotpatch for Log4j flaw is vulnerable to privilege escalation bugs. The vulnerabilities can be exploited by…
Reading Time: 2 minutes Boris Johnson’s Downing Street office was targeted by Pegasus spyware linked to the United Arab Emirates. Pegasus spyware is known to turn…
Reading Time: 2 minutes ESET, a cybersecurity firm, has discovered new Lenovo UEFI firmware vulnerabilities that affect millions of Laptops. The vulnerabilities impacting numerous Lenovo laptops…
Reading Time: 2 minutes Sophos, launched new tools to speed up cyber threat detection, this includes advanced Sophos Cloud Workload Protection, which includes new Linux host…
Reading Time: 3 minutes In this article, we bring you tips for people using personal IT to work from home. During the Covid pandemic, many users…