News

Using my version of the modified Cyber Kill Chain, you can map out the stages of a JavaScript drive-by download attack and identify how to protect yourself. 1.
The three open source tools flag malicious JavaScript packages before they are downloaded and installed from the npm package manager.
A warning to JavaScript users, ransomware gangs feeling squeezed and an SQL vulnerability found. Welcome to Cyber Security Today. It’s Monday October 25th. I’m Howard Solomon, contributing ...
As cyber threats grow more sophisticated and AI reshapes the attack surface, CISOs must rethink traditional security ...
Ikea under phishing attack, evasive JavaScript loader discovered and malware found hiding in Linux calendars. Welcome to Cyber Security Today. It's Monday November 29th. I’m Howard Solomon ...
The much talked about Cyber Security Bill is set be passed in parliament today. State Minister for ICT Zunaid Ahmed Palak will place the proposed law in the House for its passage, according to the ...
The much talked about Cyber Security Bill 2023 was placed in parliament yesterday keeping the offences under its four sections as non-bailable.