Email:

Phone No.

Whatsapp

Blog

Microsoft Defender Now Detects MacOS System, App Vulnerabilities
Microsoft Defender Now Detects MacOS System, App Vulnerabilities
Microsoft Defender Now Detects MacOS System, App Vulnerabilities
Microsoft Defender Now Detects MacOS System, App Vulnerabilities

Microsoft Defender Now Detects MacOS System, App Vulnerabilities

Microsoft Defender Now Detects MacOS System, App Vulnerabilities Microsoft announced that Defender for Endpoint will now also help admins discover OS and software vulnerabilities affecting macOS devices on their organization’s network. With the enterprise endpoint security platform’s threat and vulnerability management feature now generally available for macOS, security admins can decrease endpoints’ surface attack area

The SolarWinds Breach

The SolarWinds Breach Overview “One of the most high-profile cyberespionage campaigns in recent years.” “Among the most ambitious cyber operations ever disclosed.” “A moment of reckoning.” These are some of the descriptors applied to the SolarWinds breach, which the global cybersecurity community has been intently monitoring since it was first reported in mid-December 2020. This

Trickbot Malware Now Maps Victims’ Networks Using Masscan

Trickbot Malware Now Maps Victims’ Networks Using Masscan The Trickbot malware has been upgraded with a network reconnaissance module designed to survey local networks after infecting a victim’s computer. This new module, dubbed masrv, uses the open-source masscan tool, a mass port scanner with its own TCP/IP stack and capable of scanning large swaths of the Internet in

Malicious Script Steals Credit Card Info Stolen By Other Hackers

Malicious Script Steals Credit Card Info Stolen By Other Hackers A threat actor has infected an e-commerce store with a custom credit card skimmer designed to siphon data stolen by a previously deployed Magento card stealer. Credit card skimmers (aka payment card skimmers or Magecart scripts) are JavaScript scripts that cybercrime groups known as Magecart groups inject

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us