Blog
A new era in travel risk management has arrived.
The need for smart and scalable travel risk management solutions to protect enterprises and their workers has grown in recent years. Recent events have...
E-commerce behemoth The source code data breach has been confirmed by Mercado Libre
This week, the Argentinian e-commerce behemoth Mercado Libre disclosed "unauthorised access" to a portion of its source code. Threat actors allegedly...
CISA Expands Its List of Actively Exploited Vulnerabilities by 95.
The United States' Cybersecurity and Infrastructure Security Agency (CISA) published 95 new security weaknesses to its Known Exploited Vulnerabilities...
TeaBot Trojan infects Google Play Store Once More
By hiding trojans in software upgrades, malicious Google Play apps have gotten beyond restrictions. According to Cleafy researchers, the TeaBot banking...
Thousands of npm accounts use expired domain email addresses.
Thousands of JavaScript developers are utilising an email address with an expired domain for their npm accounts, leaving their projects vulnerable to easy...
Airspan Networks Mimosa ICS Advisory (ICSA-22-034-02)
- EXECUTIVE SYNOPSIS10.0 CVSS v3ATTENTION: Remotely exploitable/low attack complexityAirspan Networks is the vendor.Mimosa by Airspan product line of...
The phones of Finnish diplomats have been infiltrated with the NSO Group Pegasus malware.
In a cyber-espionage campaign, Finnish diplomats' computers were hacked and infected with NSO Group's Pegasus spyware, according to Finland's Ministry of...
Mobile Security Threats Will Take Center Stage in 2022- Protect Now or Regret Later!
2021- the most fruitful year for hackers- we can say this by looking at the whopping 17 % increase in the number of data breaches in 2021 compared to...
Let’s Secure your E-commerce Website from Cyber Threats with Expert Tips
Are you a proud owner of an E-commerce store? Worried about the growing eCommerce threats in 2022 that can cause harm to your online business? Fret not!...