
120 Compromised Advertisement Servers Put Millions of Internet Users at Risk
An ongoing “malvertising” campaign dubbed “Tag Barnakle” was identified as the breach point of more [...]
What’s the difference between SOC 1, 2 and 3?
What is a SOC? The difference between SOC 1, 2 and 3 is quite important [...]
Shut Down the 5 Deadliest Web Application Attack Vectors
additionally, Last update: 25 January 2022 Web applications are an essential component of any modern [...]
FBI & CISA Warning – FortiOS Vulnerabilities are Actively Exploited
APT’s exploit Fortinet FortiOS vulnerabilities to compromise systems belonging to government and commercial entities, warn [...]
“Chained” PHP Git server compromised to add back doors to PHP source code
The official PHP Git repository suffered a software supply chain attack this week. Two malicious [...]
Linux Kernel Found 3 Year Old Vulnerabilities that Allow Root Access
“Bad Things Come in Threes.” Three historical vulnerabilities have been discovered in the Linux kernel. [...]
Conducting DPIAs: The Key to Unlocking Data Protection Compliance Webinar
Why else should you attend the webinar? You’ll not only receive expert insight into triggers [...]
“Falsified” Fake Google reCAPTHA Phishing Attack Swipes Office 365 Passwords
Phishing attacks targeting Microsoft users are leveraging a fake Google reCAPTCHA page. Attackers are sending [...]
3 Triggers for Conducting a DPIA
Here’s a funny thing – recital 84 of the EU’s GDPR legislation states “…where processing [...]
“Delivery“ Malicious NPM Packages Target Amazon and Slack with Dependency Attacks
Threat actors are targeting companies to include Zillo, Amazon and Slack’s NodeJS applications by using [...]