WhatsApp has patched a zero-click, zero-day vulnerability used to install Paragon’s Graphite spyware following reports from security researchers at the University of Toronto’s Citizen Lab. […]
Author Archives: [email protected]
Learn more about using Google’s Deep Research, an AI assistant that helps you explore complex topics and delivers detailed reports.
Threat actors are exploiting a severe security flaw in PHP to deliver cryptocurrency miners and remote access trojans (RATs) like Quasar RAT. The vulnerability, assigned the CVE identifier CVE-2024-4577, refers to an argument injection vulnerability in PHP affecting Windows-based systems running in CGI mode that could allow remote attackers to run arbitrary code. Cybersecurity company
Written by Joseph Wilson and the CSA FHE Working Group. Questions of privacy and security are at the forefront of every deployment of Fully Homomorphic Encryption (FHE). In this blog post, we provide insight that will help you to evaluate FHE solutions when answering the following questions: Is this solution secure? Who says so, […]
The DMA is designed to regulate large platforms like Google, Apple and Meta and boost competition but, in reality, it is having the opposite effect by hurting European b…
While phishing has evolved, email security hasn’t kept up. Attackers now bypass MFA & detection tools with advanced phishing kits, making credential theft harder to prevent. Learn how Push Security’s browser-based security stops attacks as they happen. […]
Google Wallet now gives parents and guardians in the U.S., U.K., Australia, Spain and Poland a way to allow their children to access digital payments on their Android de…
Learn more about Google’s latest Pixel A-series phone, Pixel 9a.
The recently leaked trove of internal chat logs among members of the Black Basta ransomware operation has revealed possible connections between the e-crime gang and Russian authorities. The leak, containing over 200,000 messages from September 2023 to September 2024, was published by a Telegram user @ExploitWhispers last month. According to an analysis of the messages […]
In today’s digital world, security breaches are all too common. Despite the many security tools and training programs available, identity-based attacks—like phishing, adversary-in-the-middle, and MFA bypass—remain a major challenge. Instead of accepting these risks and pouring resources into fixing problems after they occur, why not prevent attacks from happening in the first place? Our upcoming