Organizations and individuals from different sectors across several countries in Latin America, including Chile, Colombia, Ecuador, and Panama, have been subjected to spear phishing attacks by the Blind Eagle threat operation, also known as APT-C-36, that facilitate...
New AnvilEcho PowerShell trojan distribution has been sought by Iranian state-backed threat operation TA453 — also known as APT42, Damselfly, Charming Kitten, Yellow Garuda, and Mint Sandstorm — in a spear phishing attack campaign against a major Jewish personality...
Attacks leveraging an exploit for the critical PHP-CGI remote code execution flaw, tracked as CVE-2024-4577, have been launched to compromise a Taiwan-based university’s Windows systems with the novel Msupedge malware, according to BleepingComputer.Infiltration...
Saudi Arabia’s Personal Data Protection Law (PDPL) comes into force on 13th September 2024 and regulates the collection, handling, disclosure and use of personal data. Like many data protection laws around the world, including the UK GDPR, the PDPL contains strict...
Business Security Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with 21 Aug 2024 • , 3 min. read Governments create legislation...
We employ cookies to guarantee an optimal experience on our website. For additional details, please refer to our privacy policy. By opting to utilize this site, you acknowledge and agree to our policy.OkPrivacy policy