Cybersecurity
-
New Lampion Stealer Uses ClickFix Attack
Source: Cyber Security NewsRead more: New Lampion Stealer Uses ClickFix AttackResearchers have uncovered a campaign utilizing the Lampion banking trojan to target Portuguese financial institutions. This attack leverages ClickFix lures…
-
How SASE reduces networking and security costs
Source: CIO MagazineRead more: How SASE reduces networking and security costsSASE platforms integrate networking and security, reducing complexity and costs for IT. Businesses can save significantly on operational and lifecycle…
-
New Agent-Aware Cloaking Technique Using OpenAI ChatGPT Atlas
Source: Cyber Security NewsRead more: New Agent-Aware Cloaking Technique Using OpenAI ChatGPT AtlasA new cloaking technique exploits AI browsers like OpenAI’s ChatGPT Atlas to present misleading content. This tactic can poison the…
-
WhatsApp Introduces Passwordless Chat Backups
Source: BleepingComputerRead more: WhatsApp Introduces Passwordless Chat BackupsWhatsApp is releasing a new feature for iOS and Android that allows users to create passkey-encrypted backups. Users can now…
-
New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins
Source: Cyber Security NewsRead more: New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal LoginsAirstalk is a newly discovered Windows malware family designed to exfiltrate sensitive browser credentials via a covert command-and-control channel. It…
-
700+ Malicious Android Apps Abusing NFC Relay
Source: Cyber Security NewsRead more: 700+ Malicious Android Apps Abusing NFC RelayA large-scale malware campaign exploiting NFC technology on Android has emerged, with over 760 malicious apps identified. These apps impersonate…
-
Measuring security and value at risk: The role of the risk operations center
Source: CIO MagazineRead more: Measuring security and value at risk: The role of the risk operations centerThe article discusses the challenges organizations face in quantifying cyber risk and the importance of establishing a Risk Operations Center…
-
Five Traits of Tech-Driven CEOs
Source: MIT Sloan Management ReviewRead more: Five Traits of Tech-Driven CEOsTech-driven CEOs blend business acumen with technological fluency, transforming how companies leverage technology for strategic advantage. They actively engage in…
-
Google’s Built-In AI Defenses on Android
Source: The Hacker NewsRead more: Google’s Built-In AI Defenses on AndroidGoogle announced that Android scam defenses protect users globally from over 10 billion malicious calls and messages monthly. They have…
-
Former L3Harris Executive Pleads Guilty
Source: BleepingComputerRead more: Former L3Harris Executive Pleads GuiltyPeter Williams, a former executive at L3Harris, has pleaded guilty to stealing and selling confidential cybersecurity information to a Russian…








