Headlines

Nguyen Michael

My name is Michael Nguyen, and I'm a journalist focused on military and defense matters. I strive to provide in-depth analysis of global security developments and their implications for regional stability.

"Google Takes Strides Towards Safer Android Devices with Latest API Enhancements"android,google,API,security,enhancements

“Google Takes Strides Towards Safer Android Devices with Latest API Enhancements”

Google Enhances Android Security with New APIs At Google‘s annual developer conference, the tech giant announced a series of new APIs aimed at improving Android security. The improvements include features for online browsing, sign-ins, and malware protection. One of the new APIs is the Safe Browsing real-time API which will warn users about fast-emerging malicious…

Read More
"Creating a Clear Framework: Strategies for Boards to Establish Cyber Risk Limits"cybersecurity,riskmanagement,boardgovernance,framework,strategy

“Creating a Clear Framework: Strategies for Boards to Establish Cyber Risk Limits”

The Importance of Establishing Concrete Executive Authority in Cybersecurity Risk Management Introduction Boards of directors need a sophisticated understanding of risk and must set a low risk tolerance level that is directly linked to appropriate changes to the enterprise’s risk position to mitigate cybersecurity threats. While increased cybersecurity funding is a necessary move, it is…

Read More
"Mac Malware-for-Hire Epidemic: A Dangerous Environment for Cryptocurrency Users"macmalware,cryptocurrency,cybersecurity,malware-for-hire,epidemic

“Mac Malware-for-Hire Epidemic: A Dangerous Environment for Cryptocurrency Users”

Mac Malware-for-Hire Targets Cryptocoins and Passreplaces Overview As threats to cybersecurity continue to emerge, a new trend has surfaced with the rise of “malware-for-hire,” whereby cybercriminals rent malware toolkits to other cybercriminals for a fee. Researchers at dark web monitoring firm Cyble discovered one such toolkit, dubbed Atomic macOS Stealer (AMOS), specifically built to target…

Read More
Malware Misdirection: Attackers Using Popular CDNs as Covercybersecurity,malware,CDNs,attack,misdirection

Malware Misdirection: Attackers Using Popular CDNs as Cover

Attackers Misusing Cloud Services and CDNs to Spread Malware A recent report by Netskope has highlighted that attackers are increasingly using cloud services and content delivery networks (CDNs) to deliver malware. The report found that attackers are utilising widely used cloud services and applications to deliver malware and masking their post-infection activities by routing them…

Read More
"Adapt or Fall Behind: The Fast-Paced World of Constant API Updating" - Enterprise Strategy Group Research FindingsAPIupdating,EnterpriseStrategyGroup,technologytrends,digitaltransformation,softwaredevelopment.

“Adapt or Fall Behind: The Fast-Paced World of Constant API Updating” – Enterprise Strategy Group Research Findings

# Report on Data Theorem’s “Securing the API Attack Surface” Study ## Introduction Data Theorem, a leading provider of modern application security, has partnered with Enterprise Strategy Group (ESG) to publish a report on API security titled “Securing the API Attack Surface”. The study surveyed 397 respondents from private- and public-sector organizations in North America…

Read More
Microsoft 365 Accounts Face the Menace of ‘Greatness’ Phishing-as-a-Servicemicrosoft365,phishing,cybersecurity,threat,phishing-as-a-service

Microsoft 365 Accounts Face the Menace of ‘Greatness’ Phishing-as-a-Service

Report: New ‘Greatness’ Phishing-as-a-Service Targets Microsoft 365 Accounts A new phishing-as-a-service (PaaS) tool, called ‘Greatness’, has been deployed to carry out phishing campaigns on Microsoft 365 accounts mainly in US manufacturing, healthcare, technology, and real estate sectors. Since mid-2022, the service has been used in several phishing campaigns in the UK, Australia, Canada, and South…

Read More