0

The Top Mobile Security Threats of 2022

Whether you are ordering food online, booking a doctor’s appointment, or checking your balance, you are doing it through your phone. For many years we believed that we had a valid reason to trust [...]

0

Evilnum Hackers Return With New Activity Targeting International Migration Campaigns

The Evilnum hacking group have been targeting European organisations that are involved in international migration, showing renewed signs of malicious activity within the group. Evilnum is an [...]

0

Mitre shared 2022 CWE Top 25 most dangerous software weaknesses

The MITRE organization published the 2022 CWE Top 25 most dangerous software weaknesses. The MITRE shared the list of the 2022 top 25 most common and dangerous weaknesses, it could help [...]

0

Pro-PRC Influence Operation Dragonbridge Targets Rare Earth Mining Companies

A report released by Mandiant on June 28th found a coordinated effort to generate outrage and protests against an Australian rare earth mining company, Lynas Rare Earths Ltd. Lynas, the world’s [...]

0

Ransomware Suspected in Wiltshire Farm Foods Attack

Wiltshire Farm Foods, a leading producer of frozen ready meals in the UK, has revealed that its systems are currently down after experiencing a serious cyber-attack. The producer said on Sunday [...]

0

RansomHouse gang claims to have stolen 450GB of data from chip maker giant AMD

The RansomHouse gang claims to have breached the Chipmaker giant AMD and stole 450 GB of data from the company in 2021. The RansomHouse extortion gang claims to have stolen 450 GB of data from [...]

0

ZuoRAT malware hijacks SOHO Routers to spy in the vitims

A new RAT dubbed ZuoRAT was employed in a campaign aimed at small office/home office (SOHO) routers in North American and Europe. Researchers from Black Lotus Labs, the threat intelligence [...]

0

NON-STATE ACTORS IN THE CYBERSPACE: AN ATTEMPT TO A TAXONOMIC CLASSIFICATION, ROLE, IMPACT AND RELATIONS WITH A STATE’S SOCIOECONOMIC STRUCTURE

This paper provides a taxonomic classification of non-state actors in the cyberspace, analyzing their role and impact on a state’s socioeconomic structure Cyber Non-State Actors (CNSA) are key [...]

0

LockBit 3.0 introduces important novelties, including a bug bounty program

The LockBit ransomware operators released LockBit 3.0 with important novelties, including a bug bounty program and Zcash payments. The Lockbit ransomware operation has released LockBit 3.0, which [...]

0

Cybersecurity is complex – but it doesn’t need to be costly or complicated

The pandemic tested the business resilience of every organisation. Small and medium sized enterprises (SMEs) had to maximise their digital footprint to keep operational, service their customers [...]