Key Highlights
U.S. government agencies have issued anti-phishing guidance focusing on common phishing techniques and strategies for mitigation.
The guidance addresses the threat of credenti… Read More
TORONTO — Canada has recalled 41 of its diplomats from India after the Indian government said it would revoke their diplomatic immunity, the foreign minister said Thursday, in an esc… Read More
The US cybersecurity organization CISA has updated its Known Exploited Vulnerabilities catalog to include five new security flaws that are currently being actively exploited.
This means… Read More
South Africa President, Cyril Ramaphosa has expressed his concern over the Israeli-Hamas conflict and says South Africa stands ready to share its lessons on conflict resolution.
“South… Read More
It is important for organizations to ensure that information is accessible only to authorized individuals. Access control acts as a guardian, protecting valuable information from unauthorize… Read More
Microsoft created Active Directory (AD), a directory service, for Windows domain networks. Users may connect to different corporate resources using this database and collection of services… Read More
Impact of GST Registration Cancellation
Goods and Services Tax (GST) registration is a fundamental component of India’s taxation system, revolutionising how businesses operate and… Read More
A privilege escalation vulnerability has been identified in the Trellix Windows DLP endpoint for Windows, which may be exploited to delete any file/folder for which the user does not have au… Read More
Ever wish you had a crystal ball for cyber threats? Meet MITRE ATT&CK and MITRE D3FEND, your digital fortune-tellers. In a fast-moving threat landscape, staying ahead of your adversaries… Read More
The Android security team has been busy bees this month, squashing a zero-day bug that is reportedly being exploited as we speak. This bug, known as CVE-2023-35674, is a “privilege of… Read More
You might have come across various advantages of digitalization. But have you thought of any disadvantages that it might have? One of the biggest threats to digitalization is hacking! As mo… Read More
Scattered Spider, also referred to as UNC3944, Scatter Swine, Muddled Libra, and Roasted Oktapus, is a financially motivated threat actor group that has been active since May 2022. Scattered… Read More
Please note that a new vulnerability has been discovered that affects the application “Zoom Meetings”. This vulnerability can be exploited by malicious actors to gain unauthorise… Read More
Having an incident response framework in place means you can avoid costly mistakes. It also saves time by automating IR where possible. Modern IT environments use multiple cloud service prov… Read More
The US Treasury market hit a record high in July, surpassing $25 trillion for the first time in its history. This has been reached as the US government continues to borrow to fund its operat… Read More
If you’d like to know what a ‘Pen Test’ is and the sorts of things you can expect from one, this article will give you a helpful overview.
Pen Tests
Put simply… Read More
In today’s rapidly evolving digital landscape, businesses increasingly turn to automation technologies to boost efficiency and drive growth. However, as the adoption… Read More
Sysdig, a company that specializes in cybersecurity intelligence, uncovered a sophisticated hacking operation known as Scarleteel in February. Since then, Scarleteel has refined both its inf… Read More