Lazarus Targets Defense Companies with ThreatNeedle Malware
A spear-phishing campaigned linked to a North Korean APT uses “NukeSped” malware in cyberespionage attacks against defense companies.
Read moreA spear-phishing campaigned linked to a North Korean APT uses “NukeSped” malware in cyberespionage attacks against defense companies.
Read moreA malicious website or malicious ad can trigger an exploit for the IE zero-day bug, opening the door for data theft and code execution, new analysis notes.
Read moreAnne Neuberger will join the National Security Council, according to sources.
Read moreThreat actors already stole nearly 4,000 credentials before the holiday was even over, according to report.
Read moreEnterprise security teams are “drowning in alerts.”
Read moreClar Rosso has been appointed the new Chief Executive Officer of (ISC)² and will take up the new role from 1 October when she leaves the AICPA & CIMA, where she is executive vice president of engagement and learning innovation, “Cybersecurity professionals play a critical role in our global society, and I look forward to joining the […]
The post Clar Rosso appointed CEO (ISC)² appeared first on IT Security Guru.
Read moreAfter spending several months and millions of pounds on technology that experts had repeatedly warned would not work, the UK Government was forced to abandon its centralised Covid-19 contact tracing app. A stream of IT failures in recent years has earned the Government a chequered reputation when it comes overpromising and underdelivering where digital transformation […]
The post How can the Government avoid yet more tech disasters? appeared first on IT Security Guru.
Read moreVPN software has been prevalent in the digital market for decades now, however for most SMEs, the use of a virtual private network gained immense popularity more recently. Based on a recent report, hackers are using the coronavirus pandemic to spread malware on a colossal scale. Since the COVID-19 pandemic, people are now often working […]
The post 7 key advantages of using a VPN when working from home appeared first on IT Security Guru.
Read moreChipmaker investigates a leak of intellectual property from its partner and customer resource center.
Read moreResearchers uncovered a disinformation campaign aiming to discredit NATO via fake news content on compromised news websites.
Read more