Jan 08, 2026Ravie LakshmananMalware / Financial Crime Cybersecurity researchers have disclosed details of a new campaign that uses WhatsApp as a distribution vector for a Windows banking trojan called Astaroth …
Safety & Security
Incident reporting software helps you meet OSHA rules, catch problems earlier, and reduce repeat incidents. It replaces paper reporting with accurate, fast digital tools. It improves investigations, strengthens compliance, and …
Last month, the Sunday Times published an article with a concerning headline: “Resilience training for Gen Z is booming — and that’s no bad thing” (paywalled). Resilience …
Attackers are actively exploiting a critical vulnerability in MongoDB to steal sensitive information directly from an affected server’s memory. The attacks appear to have started on Dec. 29, barely three …
How the Organizational Risk Culture Standard can supercharge your cybersecurity culture
Why you need risk culture in cyber Most post-mortems trace back to the exact cause: human drift. Someone knew but stayed quiet. Another acted alone. The solution isn’t more rules; …
The Kimwolf Botnet is Stalking Your Local Network – Krebs on Security
The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide security advisory. The vulnerability at issue has been exploited for months already, and …
Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia
The threat actor known as Transparent Tribe has been attributed to a fresh set of attacks targeting Indian governmental, academic, and strategic entities with a remote access trojan (RAT) that …
The holiday season is a time of joy, celebration, and togetherness. However, it also introduces unique challenges—especially when it comes to fire safety in the workplace. Festive decorations, flickering candles, …
Safety Behaviour – Beyond Compliance in the Modern Workplace – SafetyAtWorkBlog
Safety behaviour is often discussed in terms of compliance—whether workers follow procedures, wear protective equipment, or report hazards. Yet, this view only scratches the surface of what …
The Ivanti Endpoint Manager Mobile (EPMM) zero-day attacks, which began last spring and lasted well into the summer as attackers took advantage of patching lag, were one of the top …