Threat actors have been found deploying never-before-seen post-compromise implants in VMware’s virtualization software to seize...
An espionage-focused threat actor has been observed using a steganographic trick to conceal a previously...
A social engineering campaign leveraging job-themed lures is weaponizing a years-old remote code execution flaw...
Endpoint devices like desktops, laptops, and mobile phones enable users to connect to enterprise networks...
A “highly operational, destructive, and sophisticated nation-state activity group” with ties to North Korea has...
Microsoft officially disclosed it investigating two zero-day security vulnerabilities impacting Exchange Server 2013, 2016, and...
Security researchers are warning of previously undisclosed flaws in fully patched Microsoft Exchange servers being...
The NCSC’s threat report is drawn from recent open source reporting....
A full timeline of the Optus data breach and the events that followed it...
A Brazilian threat actor known as Prilex has resurfaced after a year-long operational hiatus with an advanced...
A new covert attack campaign singled out multiple military and weapons contractor companies with spear-phishing...
Every year, billions of credentials appear online, be it on the dark web, clear web,...
A threat actor by the name of LeakBase has shared a database containing personal information...
Several hacktivist groups are using Telegram and other tools to aid anti-government protests in Iran...
A new, multi-functional Go-based malware dubbed Chaos has been rapidly growing in volume in recent months to...
A recently discovered malware builder called Quantum Builder is being used to deliver the Agent...
Organizations struggle to find ways to keep a good security posture. This is because it...
The Russian state-sponsored threat actor known as APT28 has been found leveraging a new code execution method...
Meta Platforms on Tuesday disclosed it took steps to dismantle two covert influence operations originating...
WhatsApp has released security updates to address two flaws in its messaging app for Android and iOS...
Chris Wallis, CEO of Intruder, explains how completing the NCSC’s Startup Programme was a turning...
The Ukrainian government on Monday warned of “massive cyberattacks” by Russia targeting critical infrastructure facilities...
Cybercriminals are continuing to prey on users searching for cracked software by directing them to...
As many as 75 apps on Google Play and 10 on Apple App Store have...
The global cybersecurity market is flourishing. Experts at Gartner predict that the end-user spending for...
The infamous Lazarus Group has continued its pattern of leveraging unsolicited job opportunities to deploy...
A teenager has been arrested and charged with cyber crime offences potentially related to the...
The Australian Federal Police (AFP) on Monday disclosed it’s working to gather “crucial evidence” and...
At least three alleged hacktivist groups working in support of Russian interests are likely doing...
A China-aligned advanced persistent threat actor known as TA413 weaponized recently disclosed flaws in Sophos...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.