Trending Now
Featured news
New “Generation Y” Hierarchy of Root and Intermediate Certificates
In a ceremony held in September, Let’s Encrypt generated two new Root Certification Authorities (CAs) and six new Intermediate CAs, which we’re collectively calling...
Tech News
Tech
Read: Apache Struts Patches ‘Critical Vulnerability’ CVE-2018-11776
On August 22, Apache Struts released a security patch fixing a critical remote code execution vulnerability. This vulnerability has been assigned CVE-2018-11776 (S2-057) and...
Most popular
WordPress – Ultimate Dashboard exposed API Key
WordPress - Ultimate Dashboard exposed API Key Ultimate Dashboard allows to replace the default WordPress dashboard widgets with your own and give the WordPress...
North Korean actors blend ClickFix with new macOS backdoors in Crypto campaign
A financially motivated threat actor tracked as UNC1609 is using a ClickFix-style social engineering campaign to deploy multiple macOS malware...
Gaza Cybergang Group1, operation SneakyPastes
Gaza Cybergang(s) is a politically motivated Arabic-language cyberthreat actor, actively targeting the MENA (Middle East North Africa) region, especially the Palestinian Territories.
The confusion surrounding...
TBK DVRs Botnet Attack
Threat Actors are actively exploiting CVE-2024-3721, a command injection vulnerability in TBK DVR devices (Digital Video Recorders). This flaw allows unauthenticated remote code execution...






![[Part 3/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance](https://www.dataproof.co.za/wp-content/uploads/2018/04/part-3-4-practical-advice-to-network-and-security-operations-pros-regarding-gdpr-compliance-324x160.jpg)








