Plato Data Intelligence.
Vertical Search & Ai.

Tag: Threat Analysis

Hackers Target Google Calendar for Command-and-Control Exploit

Kamso Oguejiofor-Abugu Published on: November 8, 2023 Cybersecurity teams are on high alert as Google has exposed a...

Revolut Doubles Financial Crime Head Count in Bid to Police Fraud

Revolut, the fintech startup recognized for its innovative banking solutions, has announced the doubling of its financial crime team in a daring move aimed at increasing its...

Patch Now: APTs Continue to Pummel WinRAR Bug

State-sponsored threat actors from Russia and China continue to throttle the remote code execution (RCE) WinRAR vulnerability in unpatched systems to deliver malware to...

Operation Behind Predator Mobile Spyware Is ‘Industrial Scale’

The recent surge in Predator spyware is the result of a widespread and entrenched grey-area commercial operation that trades surveillance operations "at industrial scale."That's...

Russian Hacktivism Takes a Toll on Organizations in Ukraine, EU, US

Though sometimes they appear to be all bark and no bite, experts say Russian hacktivist groups are in fact having a serious impact on...

Spyware Vendor Targets Egyptian Orgs With Rare iOS Exploit Chain

An Israeli surveillanceware company used the three Apple zero-day vulnerabilities disclosed last week to develop an exploit chain for iPhones, and a Chrome zero-day...

Chrome Flags Third Zero-Day This Month That’s Tied to Spying Exploits

Google has fixed a zero-day vulnerability in its Chrome browser that a commercial vendor has already been actively exploiting to drop surveillance software on...

Apple Fixes 3 More Zero-Day Vulnerabilities

In an emergency security update, Apple has identified three zero-day vulnerabilities affecting iPhones and Mac products that are actively being exploited.One vulnerability, tracked as...

Part 6: Genesis of Ledger Recover – Threat Analysis / Evaluation | Ledger

Welcome back to the sixth part of our blog series on Ledger Recover’s genesis!  In the previous parts, we explained how the entropy of...

Google and Acalvio Partner to Deliver Active Defense to Protect Customers From Advanced Threats

Security is a top priority for all customers on Google Cloud, whether beginner, intermediate, or advanced users. Through our partnership with Acalvio, we are...

North Korean Hackers Target Security Researchers — Again

North Korean state-supported threat actors are targeting security researchers — the second such campaign in the last few years.Google first discovered DPRK attackers weren't going...

Threat Intelligence Efforts, Investment Lagging, Says Opswat

Almost two-thirds of organizations said their threat intelligence programs need improvement and only 22% of surveyed respondents said they have fully mature threat intel...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?