Category: EN

Spooky action: Phantom domains create hijackable hyperlinks

According to a recent paper published at the 2024 Web Conference, so-called “phantom domains” make it possible for malicious actors to hijack hyperlinks and exploit users’ trust in familiar websites. The research defines phantom domains as active links to dot-com domains…

AI and deepfakes: How to be AI-savvy

From the apps on our smartphones to chatbot assistant services, artificial intelligence (AI) is transforming our lives in both big and small ways. But as exciting as AI can be, it’s also important to understand its potential risks. October is…

U.S. CISA adds D-Link DIR-820 Router, DrayTek Multiple Vigor Router, Motion Spell GPAC, SAP Commerce Cloud bugs to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds D-Link DIR-820 Router, DrayTek Multiple Vigor Router, Motion Spell GPAC, SAP Commerce Cloud bugs to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added SonicWall SonicOS, ImageMagick and Linux…

Risk Management in Real Time with Safe Security

Join us for a groundbreaking announcement in cyber risk quantification and management. Today, Safe Security unveils SafeX, its new AI-powered mobile application designed to simplify and automate cyber risk assessment. […] The post Risk Management in Real Time with Safe…

CISA Releases Two Industrial Control Systems Advisories

CISA released two Industrial Control Systems (ICS) advisories on October 1, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-24-275-01 Optigo Networks ONS-S8 Spectra Aggregation Switch ICSA-24-275-02 Mitsubishi Electric MELSEC iQ-F FX5-OPC CISA…

Keeper Kicks Off Cybersecurity Action Month

As Cybersecurity Awareness Month unfolds this October, Keeper Security is urging individuals and organisations to take proactive steps to prevent cyberattacks. While awareness is essential, it’s not enough to protect sensitive information from evolving threats. As such, they’ve renamed the…