English News

Trellix Advanced Research Center Discovers a New Privilege Escalation Bug Class on macOS and iOS

Trellix Advanced Research Center Discovers a New Privilege Escalation Bug Class on macOS and iOS

Since the first version of iOS on the original iPhone, Apple has enforced careful restrictions on the software that can run on their mobile devices. […]
Gartner Predicts Nearly Half of Cybersecurity Leaders Will Change Jobs by 2025

Gartner Predicts Nearly Half of Cybersecurity Leaders Will Change Jobs by 2025

25% of Cybersecurity Leaders Will Pursue Different Roles Entirely Due to Workplace Stress By 2025, nearly half of cybersecurity leaders will change jobs, 25% for […]
No Surprise! ESXiArgs Ransomware Attacks Exploit 2-Year-Old Vulnerability

No Surprise! ESXiArgs Ransomware Attacks Exploit 2-Year-Old Vulnerability

Targeting VMware ESXi is not new; previous ransomware attacks such as Babuk, AvosLocker, BlackCat, Hive, and others have targeted it as well. The uniqueness of […]
Cost Savings in AWS: A Guide To Maximize Your Cloud Investments

Cost Savings in AWS: A Guide To Maximize Your Cloud Investments

AWS is one of the world’s leading cloud computing platforms. With 34% of the worldwide market share, it offers a comprehensive range of cloud-based services […]
Cyberattacks Targeting Ukraine Increase 20-fold at End of 2022 Fueled by Russia-linked Gamaredon Activity

Cyberattacks Targeting Ukraine Increase 20-fold at End of 2022 Fueled by Russia-linked Gamaredon Activity

It has been almost a year since Russia invaded Ukraine in a major escalation of the Russo-Ukrainian War, which began in 2014. It has caused […]
New Picus Red Report warns of “Swiss Army knife” malware

New Picus Red Report warns of “Swiss Army knife” malware

Latest multi-purpose malware is adept for evasion, lateral movement, and data encryption Picus Security, the pioneer of Breach and Attack Simulation (BAS), has released The […]
Data Analytics for Small Businesses: How to Manage Privacy Risks

Data Analytics for Small Businesses: How to Manage Privacy Risks

Perhaps you’ve been hearing about data analytics, which is being promoted as a way for even small businesses to analyze communications with customers, enhance customer […]
ShardSecure Announces Alliance with KPMG

ShardSecure Announces Alliance with KPMG

ShardSecure, a leading provider of cloud data security and resilience software, has formed a new alliance with KPMG LLP in the United States. KPMG LLP […]
ChatGPT and Malware: Making Your Malicious Wishes Come True

ChatGPT and Malware: Making Your Malicious Wishes Come True

Since its release in November 2022, ChatGPT has been gaining popularity, being asked everything from how to explain quantum computing to writing a birthday poem. […]
Gartner Forecasts Worldwide IT Spending to Grow 2.4% in 2023

Gartner Forecasts Worldwide IT Spending to Grow 2.4% in 2023

Inflation Throttles Consumer Purchasing Power, But Enterprise IT Spending Remains Strong Worldwide IT spending is projected to total $4.5 trillion in 2023, an increase of […]
Gartner Says Worldwide Semiconductor Revenue Grew 1.1% in 2022

Gartner Says Worldwide Semiconductor Revenue Grew 1.1% in 2022

Memory Market Was Worst-Performing Segment, Declining 10% With Continued Challenges in 2023 Worldwide semiconductor revenue increased 1.1% in 2022 to total $601.7 billion, up from […]
The Bug Report — December 2022 Edition

The Bug Report — December 2022 Edition

Why am I here? Ho Ho Ho! Welcome back to the Bug Report, or a more fitting name for this time of year: The NAUGHTY […]
Data Reveals 304.7M Online Accounts Breached in 2022

Data Reveals 304.7M Online Accounts Breached in 2022

At the start of 2023, I am reaching out with statistics about the online data breaches identified over the past year. The report based on […]
Alarming survey suggests black hat hackers should be rewarded and avoid prosecution if they hand back the bulk of their spoils

Alarming survey suggests black hat hackers should be rewarded and avoid prosecution if they hand back the bulk of their spoils

New alarming research from Naoris Protocol, a global cyber security firm, reveals many people believe black hat hackers – criminals who break into computer networks […]
Malicious JARs and Polyglot files: “Who do you think you JAR?”

Malicious JARs and Polyglot files: “Who do you think you JAR?”

Throughout 2022, Deep Instinct observed various combinations of polyglot files with malicious JARs. The initial technique dates to around 2018 when it used signed MSI […]
Schrems II Explained: Everything You Need To Know

Schrems II Explained: Everything You Need To Know

The landmark data privacy case Schrems II has had a significant impact on the digital landscape since it was decided in 2020. Affecting remote work, […]