Free service helps thousands of organisations spot suspicious activity on their networks and a new...
The online retailer’s data systems were accessed by an unauthorized third party...
Both cryptocurrency and ransomware are nothing new in the digital world; both have been there...
That’s five decades of conducting research and developing guidance....
The China-aligned espionage-focused actor dubbed Winnti has set its sights on government organizations in Hong...
1 Comment
Law enforcement authorities in France, in collaboration with Spain and Latvia, have disrupted a cybercrime...
HelpSystems, the company behind the Cobalt Strike software platform, has released an out-of-band security update...
The threat actors behind the Black Basta ransomware family have been observed using the Qakbot trojan to deploy...
The National Cybersecurity Center of Excellence (NCCoE) has published for comment a draft NIST Interagency...
The second public draft of NIST Special Publication (SP) 800-140Br1 (Revision 1), CMVP Security Policy...
New research has disclosed what’s being called a security vulnerability in Microsoft 365 that could...
Don’t let the ongoing “crypto winter” lull you into a false sense of cybersecurity. Even...
A new ransomware campaign targeted the transportation and logistics sectors in Ukraine and Poland on...
Zimbra has released patches to contain an actively exploited security flaw in its enterprise collaboration suite that...
The International Criminal Police Organization, also called the Interpol, has announced the arrests of 75...
Tata Power Company Limited, India’s largest integrated power company, on Friday confirmed it was targeted...
Details have emerged about a now-patched security flaw in Windows Common Log File System (CLFS)...
The fast fashion brand failed to disclose a data breach in 2018 that saw hackers...
Telecommunications and IT service providers in the Middle East and Asia are being targeted by...
A PHP version of an information-stealing malware called Ducktail has been discovered in the wild being distributed...
With each passing year, the cybersecurity threat landscape continues to worsen. That reality makes cybersecurity...
Web infrastructure and security company Cloudflare disclosed this week that it halted a 2.5 Tbps...
A proof-of-concept (PoC) exploit code has been made available for the recently disclosed critical security...
The NCSC’s threat report is drawn from recent open source reporting....
A previously undocumented command-and-control (C2) framework dubbed Alchimist is likely being used in the wild...
NIST Special Publication (SP) 800-220, 2021 Cybersecurity and Privacy Program Annual Report, was recently published—which...
A novel timing attack discovered against the npm’s registry API can be exploited to potentially...
What is the OWASP Top 10, and – just as important – what is it...
Toyota source code was posted on GitHub, allowing unauthorized access to over 296,000 customer’s details...
An advanced persistent threat (APT) actor known as Budworm targeted a U.S.-based entity for the first time...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.