You might be interested in …

[ZDNet] This massive phishing campaign delivers password-stealing malware disguised as ransomware

All posts, ZDNet

Java-based STRRAT malware creates a backdoor into infected machines – but distracts victims by acting like ransomware. Source: Read More (Latest topics for ZDNet in Security)

Read More

[TheRecord] A new wave of Hacktivists is turning the surveillance state against itself

Images and videos from oppressive regimes’ surveillance systems are being leaked in a new surge of suspected hacktivism that uses states’ own panopticons against them.  This escalation—including leaks involving images from inside prisons in Iran and Belarus—draws on some of the same themes as earlier hacktivist efforts, but suggests a new level of technical and […]

Read More

[NCSC-NL] NCSC-NL publishes Security testing White Paper

All posts

How do you keep your information system secure? You can do this by regularly having a security test performed on your information system. Such a test gives you additional assurance about the security of your system. The results of this test can be used to fix vulnerabilities. Aside from feeling responsible yourself, a reason for […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.