Home
News
Hacks
Reports
Contact
Menu
Home
News
Hacks
Reports
Contact
IT Model Failing.
Cybercrime will cost over
$10.5 trillion a year
by 2025
(SOURCE: cyber security ventures)
29th March 2023
CISO
Visa fraud expert outlines the many faces of payment ecosystem fraud
28th March 2023
CISO
Pakistan-Origin SideCopy Linked to New Cyberattack on India’s Ministry of Defence
28th March 2023
CISO
Apple Issues Urgent Security Update for Older iOS and iPadOS Models
27th March 2023
CISO
CISA to Start Issuing Early-Stage Ransomware Alerts
25th March 2023
CISO
Microsoft Warns of Stealthy Outlook Vulnerability Exploited by Russian Hackers
24th March 2023
CISO
CISA releases free tool for detecting malicious activity in Microsoft cloud environments
24th March 2023
CISO
Top ways attackers are targeting your endpoints
23rd March 2023
CISO
2023 Cybersecurity Maturity Report Reveals Organizational Unpreparedness for Cyberattacks
22nd March 2023
Hacker News
New NAPLISTENER Malware Used by REF2924 Group to Evade Network Detection
21st March 2023
CISO
J.P. Morgan Payments: AI Transforms Payments’ Tony Starks into Data-Driven Iron Men
21st March 2023
Hacker News
Hackers Steal Over $1.6 Million in Crypto from General Bytes Bitcoin ATMs Using Zero-Day Flaw
20th March 2023
CISO
New DotRunpeX Malware Delivers Multiple Malware Families via Malicious Ads
20th March 2023
Hacker News
Mispadu Banking Trojan Targets Latin America: 90,000+ Credentials Stolen
20th March 2023
CISO
Google Cloud’s US-East load balancers are lousy with latency
19th March 2023
Hacker News
Researcher create polymorphic Blackmamba malware with ChatGPT
18th March 2023
Hacker News
Chinese Hackers Exploit Fortinet Zero-Day Flaw for Cyber Espionage Attack
17th March 2023
CISO
A New Security Category Addresses Web-borne Threats
17th March 2023
CISO
SVB account holders targeted with phishing, scams
17th March 2023
CISO
Most security pros turn to unauthorized AI tools at work
17th March 2023
CISO
How ChatGPT is changing the cybersecurity game
17th March 2023
Hacker News
Here’s how Chinese cyber spies exploited a critical Fortinet bug
17th March 2023
CISO
APT Actors Exploited Telerik Vulnerability in Govt IIS Server – CISA
16th March 2023
THE News
Cyber attribution: Vigilance or distraction?
16th March 2023
THE News
Navigating the future of digital identity
16th March 2023
CISO
How two-step phishing attacks evade detection and what you can do about it
16th March 2023
Hacker News
CISA Issues Urgent Warning: Adobe ColdFusion Vulnerability Exploited in the Wild
15th March 2023
CISO
So, you want to deploy air-gapped Kubernetes, huh?
15th March 2023
CISO
Microsoft Rolls Out Patches for 80 New Security Flaws — Two Under Active Attack
15th March 2023
CISO
Ransomware Attacks Have Entered a Heinous New Phase
14th March 2023
CISO
What You Need to Know to Create a Winning Hybrid Workplace
14th March 2023
CISO
The Prolificacy of LockBit Ransomware
14th March 2023
Hacker News
Fortinet FortiOS Flaw Exploited in Targeted Cyberattacks on Government Entities
13th March 2023
Cloud Security
Large-scale Cyber Attack Hijacks East Asian Websites for Adult Content Redirects
13th March 2023
CISO
How to Apply NIST Principles to SaaS in 2023
13th March 2023
Hacker News
Researchers Uncover Over a Dozen Security Flaws in Akuvox E11 Smart Intercom
13th March 2023
Hacker News
KamiKakaBot Malware Used in Latest Dark Pink APT Attacks on Southeast Asian Targets
13th March 2023
CISO
Understanding password behavior key to developing stronger cybersecurity protocols
11th March 2023
CISO
BATLOADER Malware Uses Google Ads to Deliver Vidar Stealer and Ursnif Payloads
10th March 2023
Hacker News
Cybersecurity Firm Acronis Data Breach: Hackers Leak 21GB of Data
10th March 2023
CISO
China-linked Hackers Targeting Unpatched SonicWall SMA Devices with Malware
10th March 2023
Hacker News
China-linked Hackers Targeting Unpatched SonicWall SMA Devices with Malware
10th March 2023
Hacker News
New Version of Prometei Botnet Infects Over 10,000 Systems Worldwide
10th March 2023
CISO
When Partial Protection is Zero Protection: The MFA Blind Spots No One Talks About
10th March 2023
Hacker News
Xenomorph Android Banking Trojan Returns with a New and More Powerful Variant
9th March 2023
Hacker News
Hackers Exploiting Remote Desktop Software Flaws to Deploy PlugX Malware
9th March 2023
Social Media Scams
Beware of Fake Facebook Profiles, Google Ads Pushing Sys01 Stealer
9th March 2023
Hacker News
IceFire Ransomware Exploits IBM Aspera Faspex to Attack Linux-Powered Enterprise Networks
9th March 2023
Social Media Scams
Fake ChatGPT Chrome extension targeted Facebook Ad accounts
9th March 2023
CISO
Iranian Hackers Target Women Involved in Human Rights and Middle East Politics
9th March 2023
CISO
Does Your Help Desk Know Who’s Calling?
9th March 2023
CISO
Massive GitHub analysis reveals 10 million secrets hidden in 1 billion commits
9th March 2023
Hacker News
New Critical Flaw in FortiOS and FortiProxy Could Give Hackers Remote Access
9th March 2023
CISO
Inadequate patches and advisories increase cyber risk
8th March 2023
Hacker News
Jenkins Security Alert: New Security Flaws Could Allow Code Execution Attacks
8th March 2023
CISO
Jenkins Security Alert: New Security Flaws Could Allow Code Execution Attacks
7th March 2023
Hacker News
Transparent Tribe Hackers Distribute CapraRAT via Trojanized Messaging Apps
7th March 2023
Hacker News
Shein’s Android App Caught Transmitting Clipboard Data to Remote Servers
6th March 2023
Hacker News
Experts Discover Flaw in U.S. Govt’s Chosen Quantum-Resistant Encryption Algorithm
5th March 2023
Cloud Security
Week in review: LastPass breach, GCP data exfiltration, UEFI bootkit
4th March 2023
Hacker News
New FiXS ATM Malware Targeting Mexican Banks
3rd March 2023
Hacker News
Chinese Hackers Targeting European Entities with New MQsTTang Backdoor
2nd March 2023
Cloud Security
API Security Flaw Found in Booking.com Allowed Full Account Takeover
2nd March 2023
Hacker News
New Cryptojacking Campaign Leverages Misconfigured Redis Database Servers
2nd March 2023
Hacker News
SysUpdate Malware Strikes Again with Linux Version and New Evasion Tactics
2nd March 2023
Social Media Scams
Don’t be fooled by a pretty icon, malicious apps hide in plain sight
2nd March 2023
Hacker News
Critical Flaw in Cisco IP Phone Series Exposes Users to Command Injection Attack
1st March 2023
Social Media Scams
Record Number of Mobile Phishing Attacks in 2022
28th February 2023
Hacker News
Bitdefender Releases Free Decryptor for MortalKombat Ransomware Strain
28th February 2023
Hacker News
APT-C-36 Strikes Again: Blind Eagle Hackers Target Key Industries in Colombia
28th February 2023
Hacker News
CISA Issues Warning on Active Exploitation of ZK Java Web Framework Vulnerability
28th February 2023
Hacker News
LastPass Reveals Second Attack Resulting in Breach of Encrypted Password Vaults
27th February 2023
Hacker News
PlugX Trojan Disguised as Legitimate Windows Debugger Tool in Latest Attacks
27th February 2023
Hacker News
Dutch Police Arrest 3 Hackers Involved in Massive Data Theft and Extortion Scheme
23rd February 2023
Hacker News
Experts Sound Alarm Over Growing Attacks Exploiting Zoho ManageEngine Products
23rd February 2023
Hacker News
Lazarus Group Likely Using New WinorDLL64 Backdoor to Exfiltrate Sensitive Data
23rd February 2023
CISO
Python Developers Warned of Trojanized PyPI Packages Mimicking Popular Libraries
22nd February 2023
Social Media Scams
Android voice chat app with 5m installs leaked user chats
22nd February 2023
Social Media Scams
Apple Warns of 3 New Vulnerabilities Affecting iPhone, iPad, and Mac Devices
22nd February 2023
CISO
Attackers Flood NPM Repository with Over 15,000 Spam Packages Containing Phishing Links
21st February 2023
CISO
The Future of Network Security: Predictive Analytics and ML-Driven Solutions
21st February 2023
THE News
Accidental WhatsApp account takeovers? It’s a thing
21st February 2023
Hacker News
Researchers Warn of ReverseRAT Backdoor Targeting Indian Government Agencies
21st February 2023
CISO
GoDaddy Says Third Cyberattack by Group Targeted Customer Sites
19th February 2023
Hacker News
Fortinet Issues Patches for 40 Flaws Affecting FortiWeb, FortiOS, FortiOS, and FortiProxy
19th February 2023
Hacker News
QR code generator My QR Code leaks users’ login data and addresses
18th February 2023
Cloud Security
Twitter Limits SMS-Based 2-Factor Authentication to Blue Subscribers Only
18th February 2023
Hacker News
GoDaddy Discloses Multi-Year Security Breach Causing Malware Installations and Source Code Theft
17th February 2023
CISO
PayPal Scammers Using Legitimate Accounts to Send Phishing Invoices
17th February 2023
Hacker News
Critical RCE Vulnerability Discovered in ClamAV Open-Source Antivirus Software
16th February 2023
Hacker News
Hackers Using Google Ads to Spread FatalRAT Malware Disguised as Popular Apps
16th February 2023
Hacker News
New Threat Actor WIP26 Targeting Telecom Service Providers in the Middle East
15th February 2023
THE News
Experts Warn of ‘Beep’ – A New Evasive Malware That Can Fly Under the Radar
15th February 2023
Hacker News
Update Now: Microsoft Releases Patches for 3 Actively Exploited Windows Vulnerabilities
14th February 2023
Hacker News
Python Developers Beware: Clipper Malware Found in 450+ PyPI Packages!
6th December 2021
CISO
Why the C-Suite Doesn’t Need Access to All Corporate Data
29th November 2021
CISO
Data Breach at Panasonic
8th November 2021
CISO
Investor Group to Acquire McAfee for $14B
7th November 2021
CISO
Microsoft will now snitch on you at work like never before
5th November 2021
CISO
Hardcoded SSH Key in Cisco Policy Suite Lets Remote Hackers Gain Root Access
1
2
3
…
12
Next »
This website uses cookies to ensure you get the best experience on our website.
I understand
contact THE HUMAN ERROR
For further information on how The Human Error can help you. Fill out some details below, or give us a call.
Tel: 03300 417126
Name
Email
Company
Phone
Please Select Your Area of Focus?
Please Select Your Area of Focus?
3rd Party Access
Automate Pen Test Infrastructure & Cloud
Automate Pen Test Applications & Microservices
Data Sovereignty
Cyber Training
Data Encryption
Automated SOC
Cloud Access Rights
Cyber Workshops & Strategy
Message
Options
Send me a Free Printed Brochure.
Please Give Me a Call.
Send
Facebook
Twitter
Youtube
YOU HAVE
YOU NEED
SHINE A LIGHT ON ALL THREATS.
See All The Gaps.
ALERTS IN SECONDS.
Features:
Dark Threat Hunting
Policy Hardening
IOT & Shadow IT reporting
Detects "In Progress" Attacks
Alerts On Insider Threats
Installs in minutes
Request Your FREE Trial
70,000 Thoughts a day.
We Make Mistakes.