Author Archives: [email protected]

Cyber Security Today, April 5, 2024 – New ransomware gang claims 11 victims, Ivanti promises to overhaul product security, and more

A new ransomware gang claims 11 victims, Ivanti promises to overhaul product security, and more. Welcome to Cyber Security Today. It’s Friday, April 5th, 2024. I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com and TechNewsday.com in the U.S.     A new ransomware group emerged last month. Dubbed the RedCryptoApp, researchers at Netenrich say […]

CISO Perspectives on Complying with Cybersecurity Regulations

Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of compliance frameworks and the specificity of the security controls, policies, and activities they include. For CISOs and their teams, that means compliance is a time-consuming, high-stakes process that demands strong organizational and

PC Helpsoft Driver Updater Review [Is It Worth The Price?]

In this PC Helpsoft Driver Driver Updater review, I test how well the tool manages and updates drivers for your hardware and peripherals. I also cover the extra features that come with the software. This Windows 10 and 11 driver updater provides automatic updates, backups, scheduled scans, and more. It’s a simple and effective tool, […]

Diffit AI Review: Should You Try This Teaching Tool?

This Diffit AI review shows my firsthand experience with the tool. If you’re here, it’s safe to assume you’re an educator looking for an innovative service to enhance your students’ learning experience. So, is Diffit AI the one? In this article, I’ll analyze its features, explain how to use it, and provide the necessary pricing information […]

TextCortex Review – How Effective Is It?

Are you looking for a detailed TextCortex review to discover if this is the right AI writing tool for your needs?  If so, you’ve landed on the right page! In this piece, I’ll walk you through the tool’s key features, use cases, and pricing. Plus, I’ll show you exactly how to use it. Ready? Let’s […]

From PDFs to Payload: Bogus Adobe Acrobat Reader Installers Distribute Byakugan Malware

Bogus installers for Adobe Acrobat Reader are being used to distribute a new multi-functional malware dubbed Byakugan. The starting point of the attack is a PDF file written in Portuguese that, when opened, shows a blurred image and asks the victim to click on a link to download the Reader application to view the content. According to Fortinet […]

New Wave of JSOutProx Malware Targeting Financial Firms in APAC and MENA

Financial organizations in the Asia-Pacific (APAC) and Middle East and North Africa (MENA) are being targeted by a new version of an “evolving threat” called JSOutProx. “JSOutProx is a sophisticated attack framework utilizing both JavaScript and .NET,” Resecurity said in a technical report published this week. “It employs the .NET (de)serialization feature to interact with a core