Email:

Phone No.

Whatsapp

Year: 2022

Zoho Patches New Critical Authentication Bypass in Desktop Central
Zoho Patches New Critical Authentication Bypass in Desktop Central
Zoho Patches New Critical Authentication Bypass in Desktop Central
Zoho Patches New Critical Authentication Bypass in Desktop Central

Zoho Patches New Critical Authentication Bypass in Desktop Central

Zoho Patches New Critical Authentication Bypass in Desktop Central Zoho has addressed a new critical severity vulnerability that affects the company’s Desktop Central and Desktop Central MSP unified endpoint management (UEM) solutions ManageEngine Desktop Central is an endpoint management platform that allows admins to deploy patches and software over the network and troubleshoot them remotely.

DHL Dethrones Microsoft as Most Imitated Brand in Phishing Attacks

DHL Dethrones Microsoft as Most Imitated Brand in Phishing Attacks DHL was the most imitated brand in phishing campaigns throughout Q4 2021, pushing Microsoft to second place, and Google to fourth. This isn’t surprising considering that the final quarter of every year includes the Black Friday, Cyber Monday, and Christmas shopping season, so phishing lures

Nintendo Warns of Spoofed Sites Pushing Fake Switch Discounts

Nintendo Warns of Spoofed Sites Pushing Fake Switch Discounts Nintendo has warned customers of multiple sites impersonating the Japanese video game company’s official website and pretending to sell Nintendo Switch consoles at significant discounts. This rare warning was issued last week via the gaming multinational’s corporate site, which also hints at the severity of the

Cyber Espionage Campaign Targets Renewable Energy Companies

Cyber Espionage Campaign Targets Renewable Energy Companies A large-scale cyber-espionage campaign targeting primarily renewable energy and industrial technology organizations have been discovered to be active since at least 2019, targeting over fifteen entities worldwide. The campaign was discovered by security researcher William Thomas, a Curated Intelligence trust group member, who employed OSINT (open-source intelligence) techniques like

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us