Apple AirTag Zero-Day Weaponizes Trackers
Apple AirTag Zero-Day Weaponizes Trackers

In addition the hackers claimed to have accessed the login details of over 3000 Acer...

Read on
Encrypted & Fileless Malware Sees Big Growth
Encrypted & Fileless Malware Sees Big Growth

VirusTotal’s first Ransomware Activity Report reveals that it received ransomware submissions from 140 different countries...

Read on
Apache Web Server Zero-Day Exposes Sensitive Data
Apache Web Server Zero-Day Exposes Sensitive Data

Hardware and electronics giant Acer has suffered a data breach, with hackers claiming they have...

Read on
IP Surveillance Bugs in Axis Gear
IP Surveillance Bugs in Axis Gear

It’s one of the most serious threats facing organizations today, with the FBI estimating it caused...

Read on
All Source Code Leaked
All Source Code Leaked

The newspaper said it found that teachers’ Social Security numbers were contained in the HTML...

Read on
Next Phase in Cyber Warfare
Next Phase in Cyber Warfare

Prosecutors claim that the group targeted companies in the United States and around the world,...

Read on
The Coming AI Hackers
The Coming AI Hackers

Man charged with hack which shared COVID-19 test details in protest against vaccine pass. More...

Read on
Syniverse Hack
Syniverse Hack

Eleanor Dallaway, the editor of InfoSecurity Magazine, was kind enough to invite me onto her...

Read on
Tracking Stolen Cryptocurrencies
Tracking Stolen Cryptocurrencies

One of those victims, according to the authorities, was a Boston-based company that says it...

Read on
Check What Information Your Browser Leaks
Check What Information Your Browser Leaks

An Acer spokesperson confirmed that the company’s Indian offices had suffered a cyber attack. More...

Read on
Hardening Your VPN
Hardening Your VPN

A gang of three men has been charged with laundering the proceeds of a Business...

Read on
A Death Due to Ransomware
A Death Due to Ransomware

Participation at all-time high for CyberFirst summer courses, led by the National Cyber Security Centre...

Read on
Facebook Is Down
Facebook Is Down

All this and much more is discussed in the latest edition of the award-winning “Smashing...

Read on
Connecting your SOC with mobile teams
Connecting your SOC with mobile teams

In it we discuss infosecurity rockstars, podcasts, how I would feel if I was stranded...

Read on
Remote work worked, until it didn’t
Remote work worked, until it didn’t

According to prosecutors, Elkhebri’s alleged role in the plot was to open multiple bank accounts...

Read on
End-to-end encryption and securing data
End-to-end encryption and securing data

A married couple are accused of selling nuclear sub secrets, Facebook continues to make young...

Read on
Developer Tools or simply right-clicking on the page
Developer Tools or simply right-clicking on the page

In other words, the information was available to anyone with a web browser who happened...

Read on
The hidden threat of business collaboration tools
The hidden threat of business collaboration tools

Your organization risks compliance and disaster protection shortcomings unless your data management practices catch up...

Read on
Showing 18 of 18 Results