phishing
-
Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models
Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to bypass safety protocols and extract potentially…
Read More » -
How to Develop a Strong Security Culture
Developing a strong security culture is one of the most critical responsibilities for today’s CISOs (Chief Information Security Officers) and…
Read More » -
Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans
The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network infrastructure named “Cloudflare tunnel infrastructure to…
Read More » -
Infostealer Attacks Surge 84% Weekly Through Phishing Emails
The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week in 2024, according to the latest…
Read More » -
Security Awareness Metrics That Matter to the CISO
In today’s rapidly evolving threat landscape, Chief Information Security Officers (CISOs) are tasked with more than just deploying the latest…
Read More » -
How SMBs Can Improve SOC Maturity With Limited Resources
Small and Medium-sized Businesses (SMBs) have become prime targets for cybercriminals, being three times more likely to be targeted by…
Read More » -
Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector
The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend for global businesses. According to a…
Read More » -
Galaxy S24 Vulnerability Poses Risk of Unauthorized File Access
A security flaw in Samsung’s Quick Share feature for the Galaxy S24 series has been disclosed, enabling attackers to create…
Read More » -
Threat Actors Manipulate Search Results to Lure Users to Malicious Websites
Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search engine results, pushing malicious websites…
Read More »