“Chained” PHP Git server compromised to add back doors to PHP source code“Chained” PHP Git server compromised to add back doors to PHP source code

“Chained” PHP Git server compromised to add back doors to PHP source code

4 years ago

The official PHP Git repository suffered a software supply chain attack this week. Two malicious commits were pushed to the…

Linux Kernel Found 3 Year Old Vulnerabilities that Allow Root AccessLinux Kernel Found 3 Year Old Vulnerabilities that Allow Root Access

Linux Kernel Found 3 Year Old Vulnerabilities that Allow Root Access

4 years ago

“Bad Things Come in Threes." Three historical vulnerabilities have been discovered in the Linux kernel. If exploited, it could be…

Conducting DPIAs: The Key to Unlocking Data Protection Compliance WebinarConducting DPIAs: The Key to Unlocking Data Protection Compliance Webinar

Conducting DPIAs: The Key to Unlocking Data Protection Compliance Webinar

4 years ago

Why else should you attend the webinar? You'll not only receive expert insight into triggers and mistakes to avoid but…

“Falsified” Fake Google reCAPTHA Phishing Attack Swipes Office 365 Passwords“Falsified” Fake Google reCAPTHA Phishing Attack Swipes Office 365 Passwords

“Falsified” Fake Google reCAPTHA Phishing Attack Swipes Office 365 Passwords

4 years ago

Phishing attacks targeting Microsoft users are leveraging a fake Google reCAPTCHA page. Attackers are sending thousands of emails to steal…

When to Kick Off a DPIA: 3 Key TriggersWhen to Kick Off a DPIA: 3 Key Triggers

When to Kick Off a DPIA: 3 Key Triggers

4 years ago

Here’s a funny thing – recital 84 of the EU’s GDPR legislation states “…where processing operations are likely to result…

“Delivery“ Malicious NPM Packages Target Amazon and Slack with Dependency Attacks“Delivery“ Malicious NPM Packages Target Amazon and Slack with Dependency Attacks

“Delivery“ Malicious NPM Packages Target Amazon and Slack with Dependency Attacks

4 years ago

Threat actors are targeting companies to include Zillo, Amazon and Slack’s NodeJS applications by using a new vulnerability known as…

MacOS Malware “Not So Silver Linings”

4 years ago

Apple’s new M1 chips had no known malware for them...until now. A vulnerability dubbed the “Silver Sparrow” is an activity…

Properly Deleting Personal Data the Right WayProperly Deleting Personal Data the Right Way

Properly Deleting Personal Data the Right Way

4 years ago

Are you managing personal data deletion correctly under the DPA and GDPR? Does everyone in your organisation know what to…

What KPIs Should be Tracked for Security Penetration Testing?What KPIs Should be Tracked for Security Penetration Testing?

What KPIs Should be Tracked for Security Penetration Testing?

4 years ago

Cyber security is a journey and not just a destination. In the ever-changing security landscape, regular testing and mitigation are…