
Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Security Directory Server
There are vulnerabilities in IBM SDK Java Technology Edition that is shipped with IBM Security Directory Server(SDS) The issues were disclosed as part of the […]

Data of 6.5 million Israeli citizens leaks online
The voter registration and personal details of millions of Israeli citizens were leaked online on Monday, just two days before the country held general elections […]

Energy Giant Shell Is Latest Victim of Accellion Attacks
Attackers accessed personal and business data from the company’s legacy file-transfer service in a recent data-security incident but core IT systems remained untouched. Energy Giant […]

Gartner Forecasts Worldwide Social Software and Collaboration Market to Grow 17% in 2021
Remote Work and Enterprise Application Partnerships to Drive Double-Digit Growth Through 2022 The worldwide social software and collaboration market is forecast to total $4.5 billion […]

Gartner Identifies Top Security and Risk Management Trends for 2021
Analysts Explore Industry Trends at Gartner Security & Risk Management Summit APAC, 23-24 March 2021 Security and risk management leaders must address eight top trends […]

Dangers in SAP Transport Management Part 3
Manipulation of the SAP Job Management This is part three of our blog series on the Dangers in SAP Transport Management. In part one, we […]

Top 15 Essential Malware Analysis Tools
Malware analysis plays an essential role in avoiding and understanding cyber attacks. When incident response teams are brought into an an incident involving malware, the […]

Office 365 Phishing Attack Targets Financial Execs
Attackers move on new CEOs, using transition confusion to harvest Microsoft credentials. A new phishing scam is on the rise, targeting executives in the insurance […]

Ransomware gang demands $50 million from computer maker Acer
Taiwanese computer maker Acer has suffered a ransomware attack over the past weekend at the hands of the REvil ransomware gang, which is now demanding […]

Threat actors start attacking F5 devices using recent vulnerability
Multiple hacking groups have started attacking F5 networking devices after the publication of proof-of-concept exploit code online for a recent critical vulnerability the vendor patched […]

Why America will never be safe from cyberattacks
It’s impossible to stop all hacks, and a lack of cybersecurity experts isn’t helping + “Nobody knows how to make a system that is usable […]

China-linked TA428 Continues to Target Russia and Mongolia IT Companies
Recorded Future’s Insikt Group recently identified renewed activity attributed to the suspected Chinese threat activity group TA428. The identified activity overlaps with a TA428 campaign […]

“Expert” hackers used 11 zerodays to infect Windows, iOS, and Android users
The breadth and abundance of exploits for unknown vulnerabilities sets group apart. https://arstechnica.com/information-technology/2021/03/expert-hackers-used-11-zerodays-to-infect-windows-ios-and-android-users/ […]

New macOS malware XcodeSpy Targets Xcode Developers with EggShell Backdoor
Threat actors are abusing the Run Script feature in Apple’s Xcode IDE to infect unsuspecting Apple Developers via shared Xcode Projects. XcodeSpy is a malicious […]

ETSI standard to secure digital signatures solves issue for 4,000 banks
ETSI is pleased to unveil ETSI TS 119 182-1, a specification for digital signatures supported by PKI and public key certificates which authenticates the origin […]

Chinese cyberspies go after telco providers, 5G secrets
A Chinese cyber-espionage group has shifted operations from targeting Vatican officials and Catholic organizations to telecom providers across Asia, Europe, and the US. https://therecord.media/chinese-cyberspies-go-after-telco-providers-5g-secrets/ […]
