Email:

Phone No.

Whatsapp

Blog

BlueNoroff Hackers Steal Crypto Using Fake MetaMask Extension
BlueNoroff Hackers Steal Crypto Using Fake MetaMask Extension
BlueNoroff Hackers Steal Crypto Using Fake MetaMask Extension
BlueNoroff Hackers Steal Crypto Using Fake MetaMask Extension

BlueNoroff Hackers Steal Crypto Using Fake MetaMask Extension

BlueNoroff Hackers Steal Crypto Using Fake MetaMask Extension The North Korean threat actor group known as ‘BlueNoroff’ has been spotted targeting cryptocurrency startups with malicious documents and fake MetaMask browser extensions. The motive of this group is purely financial, but its sophistication in carrying out objectives has previously led researchers to conclude that this is a sub-group

AWS Fixes Security Flaws that Exposed AWS Customer Data

AWS Fixes Security Flaws that Exposed AWS Customer Data Amazon Web Services (AWS) has addressed an AWS Glue security issue that allowed attackers to access and alter data linked to other AWS customer accounts. AWS Glue is a serverless cloud data integration service that helps discover, prepare, and combine data for app development, machine learning, and

Microsoft Pulls New Windows Server Updates Due to Critical Bugs

Microsoft Pulls New Windows Server Updates Due to Critical Bugs Microsoft has pulled the January Windows Server cumulative updates after critical bugs caused domain controllers to reboot, Hyper-V to not work, and ReFS volume systems to become unavailable. Tuesday, Microsoft released the January 2022 Patch Tuesday updates for Windows Server that includes numerous security updates and bug

Microsoft Defender Weakness lets Hackers Bypass Malware Detection

Microsoft Defender Weakness lets Hackers Bypass Malware Detection Threat actors can take advantage of a weakness that affects Microsoft Defender antivirus on Windows to learn locations excluded from scanning and plant malware there. The issue has persisted for at least eight years, according to some users, and affects Windows 10 21H1 and Windows 10 21H2.

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us