My Courses
-

New NIST guide explains how to detect morphed images
Face morphing software has the capability to blend two individuals’ photos into a single image, enabling potential identity fraud at secure locations such as buildings,…
-

How security teams are currently utilizing AI.
Artificial Intelligence (AI) is transitioning from a proof-of-concept phase into everyday security operations within Security Operations Centres (SOCs). It is now employed to reduce alert…
-

Workday data breach linked to Salesforce hack
Workday has reportedly become one of the latest major companies to have its Salesforce instances compromised by hackers. This incident appears to be part of…
-

New 5G vulnerability bypasses need for malicious base station
Researchers have unveiled a novel 5G attack known as Sni5Gect, which poses significant security risks by enabling attackers to sniff traffic and disrupt network operations….
-

Cofense Vision 3.0 detects how users interact with phishing messages
Cofense has launched Vision 3.0, the latest enhancement to its Phishing Threat Detection and Response (PDR) platform, which significantly improves incident response times. This new…
-

GodRAT Trojan with Gh0st RAT code uses steganography to target brokerage firms
Financial institutions, particularly trading and brokerage firms, are currently facing a new threat from a remote access trojan known as GodRAT. This malware campaign involves…
-

The United States imposes sanctions on Garantex and Grinex due to ransomware involvement
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has renewed sanctions against the Russian cryptocurrency exchange platform Garantex for facilitating ransomware…
-

Cyber insurance sector showing signs of maturity
The cyber insurance market is evolving and showing early signs of maturity, as highlighted by recent research from Arctic Wolf. Brokers and carriers are assuming…



