Uncategorized
Russian Hackers Attacking WhatsApp Users With Malicious QR codes
Russian state-sponsored hacking group Star Blizzard has shifted its tactics to exploit WhatsApp users through malicious QR codes. This marks a significant evolution in the group’s spear-phishing campaigns, which have
US Treasury Breach – Chinese Hackers Accessed Secretary Janet Yellen’s Computer
Chinese state-sponsored hackers have successfully breached the computer systems of the U.S. Treasury Department, gaining access to Secretary Janet Yellen’s personal computer. This incident, described as a “major incident” by
Malware Trends Review 2024 – An Year With Highest Ever Recorded Cyber Threats
Last year witnessed an alarming escalation in cyber threats, with malware families evolving and attack tactics becoming more sophisticated than ever. According to a detailed analysis by ANY.RUN, a prominent
Extension Poisoning Campaign Highlights Gaps in Browser Security
Aembit Announces Speaker Lineup for the Inaugural NHIcon
Aembit, the non-human identity and access management (IAM) company, unveiled the full agenda for NHIcon 2025, a virtual event dedicated to advancing non-human identity security, streaming live on Jan. 28
Sweet Security Introduces Patent-Pending LLM-Powered Detection Engine
Sweet Security, a leader in cloud runtime detection and response, today announced the launch of its groundbreaking patent-pending Large Language Model (LLM)-powered cloud detection engine. This innovation enhances Sweet’s unified
The Ultimate SaaS Security Admin Guide – 2025
Software as a Service (SaaS), which provides flexible, available, and cost-effective software solutions, has changed how businesses work in the digital world. But while SaaS apps are helpful and easy