At the moment the perpetrators of these attacks are unknown, but they are targeting Macs, with malware that allows backdoor access to the devices Once in the malware, bypasses various MacOS defences and is then able to exfiltrate a range of data from the machines, including keystrokes, emails, documents, files, …
Air-gapped systems used to be among the most secure IT systems – but they may be not anymore…
An air-gapped system is designed to be very secure. It is not connected to any other system, network or internet – literally a physical gap between it and the rest of the IT world. If it is not connected, then threat actors cannot connect to it. Mordechai Guri, from Ben-Gurion …
More warnings about the possible spread of the Russian Ukraine cyber-conflict and NATO members are targets.
The European Union (EU) has issued a warning about the measurably increase in the volume of Russian cyber-attacks associated with the Russia Ukraine conflict and how these attacks can easily spread to other regions. Nations that actively support Ukraine, with whatever resources, are likely to be “at risk” of this …
How secure is your WordPress website and blog? Do you even know if your organisation’s website is built on WordPress?
There has been a flurry of WordPress security and vulnerability articles over the past week or so. It is no surprise that the world’s most popular website builder is a target for threat actors, especially as Automatic’s core code can be added to with third-party, open-source or even self-written plugins, …