IT Model Failing.
Cybercrime will cost over
$10.5 trillion a year by 2025
(SOURCE: cyber security ventures)
CISO

Visa fraud expert outlines the many faces of payment ecosystem fraud

CISO

Pakistan-Origin SideCopy Linked to New Cyberattack on India’s Ministry of Defence

CISO

Apple Issues Urgent Security Update for Older iOS and iPadOS Models

CISO

CISA to Start Issuing Early-Stage Ransomware Alerts

CISO

Microsoft Warns of Stealthy Outlook Vulnerability Exploited by Russian Hackers

CISO

CISA releases free tool for detecting malicious activity in Microsoft cloud environments

CISO

Top ways attackers are targeting your endpoints

CISO

2023 Cybersecurity Maturity Report Reveals Organizational Unpreparedness for Cyberattacks

Hacker News

New NAPLISTENER Malware Used by REF2924 Group to Evade Network Detection

CISO

J.P. Morgan Payments: AI Transforms Payments’ Tony Starks into Data-Driven Iron Men

Hacker News

Hackers Steal Over $1.6 Million in Crypto from General Bytes Bitcoin ATMs Using Zero-Day Flaw

CISO

New DotRunpeX Malware Delivers Multiple Malware Families via Malicious Ads

Hacker News

Mispadu Banking Trojan Targets Latin America: 90,000+ Credentials Stolen

CISO

Google Cloud’s US-East load balancers are lousy with latency

Hacker News

Researcher create polymorphic Blackmamba malware with ChatGPT

Hacker News

Chinese Hackers Exploit Fortinet Zero-Day Flaw for Cyber Espionage Attack

CISO

A New Security Category Addresses Web-borne Threats

CISO

SVB account holders targeted with phishing, scams

CISO

Most security pros turn to unauthorized AI tools at work

CISO

How ChatGPT is changing the cybersecurity game

Hacker News

Here’s how Chinese cyber spies exploited a critical Fortinet bug

CISO

APT Actors Exploited Telerik Vulnerability in Govt IIS Server – CISA

THE News

Cyber attribution: Vigilance or distraction?

THE News

Navigating the future of digital identity

CISO

How two-step phishing attacks evade detection and what you can do about it

Hacker News

CISA Issues Urgent Warning: Adobe ColdFusion Vulnerability Exploited in the Wild

CISO

So, you want to deploy air-gapped Kubernetes, huh?

CISO

Microsoft Rolls Out Patches for 80 New Security Flaws — Two Under Active Attack

CISO

Ransomware Attacks Have Entered a Heinous New Phase

CISO

What You Need to Know to Create a Winning Hybrid Workplace

CISO

The Prolificacy of LockBit Ransomware

Hacker News

Fortinet FortiOS Flaw Exploited in Targeted Cyberattacks on Government Entities

Cloud Security

Large-scale Cyber Attack Hijacks East Asian Websites for Adult Content Redirects

CISO

How to Apply NIST Principles to SaaS in 2023

Hacker News

Researchers Uncover Over a Dozen Security Flaws in Akuvox E11 Smart Intercom

Hacker News

KamiKakaBot Malware Used in Latest Dark Pink APT Attacks on Southeast Asian Targets

CISO

Understanding password behavior key to developing stronger cybersecurity protocols

CISO

BATLOADER Malware Uses Google Ads to Deliver Vidar Stealer and Ursnif Payloads

Hacker News

Cybersecurity Firm Acronis Data Breach: Hackers Leak 21GB of Data

CISO

China-linked Hackers Targeting Unpatched SonicWall SMA Devices with Malware

Hacker News

China-linked Hackers Targeting Unpatched SonicWall SMA Devices with Malware

Hacker News

New Version of Prometei Botnet Infects Over 10,000 Systems Worldwide

CISO

When Partial Protection is Zero Protection: The MFA Blind Spots No One Talks About

Hacker News

Xenomorph Android Banking Trojan Returns with a New and More Powerful Variant

Hacker News

Hackers Exploiting Remote Desktop Software Flaws to Deploy PlugX Malware

Social Media Scams

Beware of Fake Facebook Profiles, Google Ads Pushing Sys01 Stealer

Hacker News

IceFire Ransomware Exploits IBM Aspera Faspex to Attack Linux-Powered Enterprise Networks

Social Media Scams

Fake ChatGPT Chrome extension targeted Facebook Ad accounts

CISO

Iranian Hackers Target Women Involved in Human Rights and Middle East Politics

CISO

Does Your Help Desk Know Who’s Calling?

CISO

Massive GitHub analysis reveals 10 million secrets hidden in 1 billion commits

Hacker News

New Critical Flaw in FortiOS and FortiProxy Could Give Hackers Remote Access

CISO

Inadequate patches and advisories increase cyber risk

Hacker News

Jenkins Security Alert: New Security Flaws Could Allow Code Execution Attacks

CISO

Jenkins Security Alert: New Security Flaws Could Allow Code Execution Attacks

Hacker News

Transparent Tribe Hackers Distribute CapraRAT via Trojanized Messaging Apps

Hacker News

Shein’s Android App Caught Transmitting Clipboard Data to Remote Servers

Hacker News

Experts Discover Flaw in U.S. Govt’s Chosen Quantum-Resistant Encryption Algorithm

Cloud Security

Week in review: LastPass breach, GCP data exfiltration, UEFI bootkit

Hacker News

New FiXS ATM Malware Targeting Mexican Banks

Hacker News

Chinese Hackers Targeting European Entities with New MQsTTang Backdoor

Cloud Security

API Security Flaw Found in Booking.com Allowed Full Account Takeover

Hacker News

New Cryptojacking Campaign Leverages Misconfigured Redis Database Servers

Hacker News

SysUpdate Malware Strikes Again with Linux Version and New Evasion Tactics

Social Media Scams

Don’t be fooled by a pretty icon, malicious apps hide in plain sight

Hacker News

Critical Flaw in Cisco IP Phone Series Exposes Users to Command Injection Attack

Social Media Scams

Record Number of Mobile Phishing Attacks in 2022

Hacker News

Bitdefender Releases Free Decryptor for MortalKombat Ransomware Strain

Hacker News

APT-C-36 Strikes Again: Blind Eagle Hackers Target Key Industries in Colombia

Hacker News

CISA Issues Warning on Active Exploitation of ZK Java Web Framework Vulnerability

Hacker News

LastPass Reveals Second Attack Resulting in Breach of Encrypted Password Vaults

Hacker News

PlugX Trojan Disguised as Legitimate Windows Debugger Tool in Latest Attacks

Hacker News

Dutch Police Arrest 3 Hackers Involved in Massive Data Theft and Extortion Scheme

Hacker News

Experts Sound Alarm Over Growing Attacks Exploiting Zoho ManageEngine Products

Hacker News

Lazarus Group Likely Using New WinorDLL64 Backdoor to Exfiltrate Sensitive Data

CISO

Python Developers Warned of Trojanized PyPI Packages Mimicking Popular Libraries

Social Media Scams

Android voice chat app with 5m installs leaked user chats

Social Media Scams

Apple Warns of 3 New Vulnerabilities Affecting iPhone, iPad, and Mac Devices

CISO

Attackers Flood NPM Repository with Over 15,000 Spam Packages Containing Phishing Links

CISO

The Future of Network Security: Predictive Analytics and ML-Driven Solutions

THE News

Accidental WhatsApp account takeovers? It’s a thing

Hacker News

Researchers Warn of ReverseRAT Backdoor Targeting Indian Government Agencies

CISO

GoDaddy Says Third Cyberattack by Group Targeted Customer Sites

Hacker News

Fortinet Issues Patches for 40 Flaws Affecting FortiWeb, FortiOS, FortiOS, and FortiProxy

Hacker News

QR code generator My QR Code leaks users’ login data and addresses

Cloud Security

Twitter Limits SMS-Based 2-Factor Authentication to Blue Subscribers Only

Hacker News

GoDaddy Discloses Multi-Year Security Breach Causing Malware Installations and Source Code Theft

CISO

PayPal Scammers Using Legitimate Accounts to Send Phishing Invoices

Hacker News

Critical RCE Vulnerability Discovered in ClamAV Open-Source Antivirus Software

Hacker News

Hackers Using Google Ads to Spread FatalRAT Malware Disguised as Popular Apps

Hacker News

New Threat Actor WIP26 Targeting Telecom Service Providers in the Middle East

THE News

Experts Warn of ‘Beep’ – A New Evasive Malware That Can Fly Under the Radar

Hacker News

Update Now: Microsoft Releases Patches for 3 Actively Exploited Windows Vulnerabilities

Hacker News

Python Developers Beware: Clipper Malware Found in 450+ PyPI Packages!

CISO

Why the C-Suite Doesn’t Need Access to All Corporate Data

CISO

Data Breach at Panasonic

CISO

Investor Group to Acquire McAfee for $14B

CISO

Microsoft will now snitch on you at work like never before

CISO

Hardcoded SSH Key in Cisco Policy Suite Lets Remote Hackers Gain Root Access

1 2 3 12

This website uses cookies to ensure you get the best experience on our website.

contact THE HUMAN ERROR

For further information on how The Human Error can help you. Fill out some details below, or give us a call.



Tel: 03300 417126

YOU HAVE

YOU NEED

SHINE A LIGHT ON ALL THREATS.
See All The Gaps.
ALERTS IN SECONDS.

Features:

Dark Threat Hunting Policy Hardening IOT & Shadow IT reporting Detects "In Progress" Attacks Alerts On Insider Threats Installs in minutes

70,000 Thoughts a day.
We Make Mistakes.