
“Chained” PHP Git server compromised to add back doors to PHP source code
The official PHP Git repository suffered a software supply chain attack this week. Two malicious [...]
Linux Kernel Found 3 Year Old Vulnerabilities that Allow Root Access
“Bad Things Come in Threes.” Three historical vulnerabilities have been discovered in the Linux kernel. [...]
Conducting DPIAs: The Key to Unlocking Data Protection Compliance Webinar
Why else should you attend the webinar? You’ll not only receive expert insight into triggers [...]
“Falsified” Fake Google reCAPTHA Phishing Attack Swipes Office 365 Passwords
Phishing attacks targeting Microsoft users are leveraging a fake Google reCAPTCHA page. Attackers are sending [...]
When to Kick Off a DPIA: 3 Key Triggers
Here’s a funny thing – recital 84 of the EU’s GDPR legislation states “…where processing [...]
“Delivery“ Malicious NPM Packages Target Amazon and Slack with Dependency Attacks
Threat actors are targeting companies to include Zillo, Amazon and Slack’s NodeJS applications by using [...]
MacOS Malware “Not So Silver Linings”
Apple’s new M1 chips had no known malware for them…until now. A vulnerability dubbed the [...]
Properly Deleting Personal Data the Right Way
Are you managing personal data deletion correctly under the DPA and GDPR? Does everyone in [...]
What KPIs Should be Tracked for Security Penetration Testing?
Cyber security is a journey and not just a destination. In the ever-changing security landscape, [...]