Google Blocks 1.43 Million Malicious Apps, Bans 73,000 Bad Accounts in 2022
May 01, 2023Ravie LakshmananMobile Security / Android
Google disclosed that its improved security features and app review processes helped it block 1.43 million bad...
Hackers are Selling a new Atomic macOS (AMOS) Stealer
Atomic macOS Stealer (AMOS) is a recent information-stealing malware capable of attacking macOS to steal confidential information.This malware was discovered by Cyble Research and...
ChatGPT is Back in Italy After Addressing Data Privacy Concerns
Apr 29, 2023Ravie LakshmananData Safety / Privacy / AI
OpenAI, the company behind ChatGPT, has officially made a return to Italy after the...
Google Adds New Cyber Security Tools & Features to ChromeOS
As per reports, cybercrime will reach $10.5 trillion by 2025, including all kinds of cybercrime activities like RaaS, Phishing, malware, and much more. It...
CISA Warns of Critical Flaws in Illumina’s DNA Sequencing Instruments
Apr 29, 2023Ravie LakshmananHealthcare / Cybersecurity
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released an Industrial Control Systems (ICS) medical advisory warning...
ViperSoftX InfoStealer Adopts Sophisticated Techniques to Avoid Detection
Apr 28, 2023Ravie LakshmananData Security / Malware
A significant number of victims in the consumer and enterprise sectors located across Australia, Japan, the U.S.,...
Zyxel Firewall Devices Vulnerable to Remote Code Execution Attacks — Patch Now
Apr 28, 2023Ravie LakshmananNetwork Security / Vulnerability
Networking equipment maker Zyxel has released patches for a critical security flaw in its firewall devices that...
TCP vs UDP – What is the Difference?
If you have ever had to configure a firewall, set up a router, or choose the best VPN for your computer, chances are you...
Why Your Detection-First Security Approach Isn’t Working
Stopping new and evasive threats is one of the greatest challenges in cybersecurity. This is among the biggest reasons why attacks increased dramatically...
SOC Training – SOC Analyst Cyber Attack Intrusion Training
SOC Training is one of the most critical concerns in building a Quality Security Operation Center Team to fight against advanced threats that target...











