120 Compromised Advertisement Servers Put Millions of Internet Users at Risk

An ongoing “malvertising” campaign dubbed “Tag Barnakle” was identified as the breach point of more [...]

What’s the difference between SOC 1, 2 and 3?

What is a SOC? The difference between SOC 1, 2 and 3 is quite important [...]

Shut Down the 5 Deadliest Web Application Attack Vectors

additionally,  Last update: 25 January 2022 Web applications are an essential component of any modern [...]

FBI & CISA Warning – FortiOS Vulnerabilities are Actively Exploited

APT’s exploit Fortinet FortiOS vulnerabilities to compromise systems belonging to government and commercial entities, warn [...]

“Chained” PHP Git server compromised to add back doors to PHP source code

The official PHP Git repository suffered a software supply chain attack this week. Two malicious [...]

Linux Kernel Found 3 Year Old Vulnerabilities that Allow Root Access

“Bad Things Come in Threes.” Three historical vulnerabilities have been discovered in the Linux kernel. [...]

Conducting DPIAs: The Key to Unlocking Data Protection Compliance Webinar

Why else should you attend the webinar? You’ll not only receive expert insight into triggers [...]

“Falsified” Fake Google reCAPTHA Phishing Attack Swipes Office 365 Passwords

Phishing attacks targeting Microsoft users are leveraging a fake Google reCAPTCHA page. Attackers are sending [...]

3 Triggers for Conducting a DPIA

Here’s a funny thing – recital 84 of the EU’s GDPR legislation states “…where processing [...]

“Delivery“ Malicious NPM Packages Target Amazon and Slack with Dependency Attacks

Threat actors are targeting companies to include Zillo, Amazon and Slack’s NodeJS applications by using [...]

Risk Crew