nquiringminds Ltd
  • Home
  • Platform
  • Case Studies
    • agritech
    • audit
    • business rates
    • care
    • economic analyser
    • i4.0
    • net zero
    • smart cities
    • Cyber TDX
  • News Agents
    • AI legal
    • Cybernews
  • About
    • Who are we
    • Awards
    • News
    • Working with
    • Life
    • Careers
    • Contact us
Select Page

QR Codes Used in 22% of Phishing Attacks, Study Finds

October 20, 2023 | Cybernews

A recent study reveals that QR codes are being used in a significant number of phishing attacks, making them a potential threat vector for delivering malicious payloads.

Sophisticated MATA Framework Targets Eastern European Oil and Gas Companies

October 20, 2023 | Cybernews

A cyber espionage operation utilizing the MATA framework, previously associated with North Korean hackers Lazarus Group, targets Eastern European companies in the oil and gas sector and defense industry using spear-phishing and an Internet Explorer zero-day bug.

Microsoft Warns of North Korean Threat Actors Exploiting Critical Vulnerability in JetBrains TeamCity Servers

October 20, 2023 | Cybernews

North Korean threat actors Diamond Sleet and Onyx Sleet have been exploiting a critical vulnerability in JetBrains TeamCity servers since October 2023, potentially leading to the theft of source code, service secrets, and private keys.

State-sponsored Russian and Chinese hackers exploit WinRAR vulnerability to gain unauthorized access to sensitive information.

October 20, 2023 | Cybernews

State-sponsored threat actors from Russia and China are using a high-severity vulnerability in WinRAR to extract sensitive information and compromise targeted systems.

Hacker Group GhostSec Releases Sophisticated Ransomware Program GhostLocker

October 20, 2023 | Cybernews

GhostSec, a hacktivist group, has released a groundbreaking ransomware program called GhostLocker that utilizes military-grade encryption algorithms and offers a unique service for managing negotiations following successful breaches.

Continuous Vulnerability Scanning: A Crucial Process for Proactive Security Measures

October 20, 2023 | Cybernews

Continuous vulnerability scanning utilizes automated tools to identify known vulnerabilities and missing patches, providing organizations with real-time monitoring and automation to quickly identify and resolve issues, reducing the risk of breaches.

« Older Entries
Next Entries »

You may also want to see:

  • Backbone technologies for The Digital Targeting Web – Demonstrator & workshopMarch 27, 2026
  • Nquiringminds Joins Prestigious London Stock Exchange Event to Champion Defence InnovationMay 14, 2025
  • NquiringMinds and NIST Trusted IOT OnboardingApril 22, 2025
  • Empowering Women in AI: A Step Towards Inclusive InnovationApril 15, 2025
  • Engineering Trustworthy AI : From Concept to RealityFebruary 25, 2025
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT