The Keksec threat actor has been linked to a previously undocumented malware strain, which has...
There are several myths and misconceptions about API security. These myths about securing APIs are...
An updated version of a malware loader codenamed IceXLoader is suspected of having compromised thousands of personal...
VMware has patched five security flaws affecting its Workspace ONE Assist solution, some of which could be...
Microsoft’s latest round of monthly security updates has been released with fixes for 68 vulnerabilities spanning its...
1 Comment
The Amadey malware is being used to deploy LockBit 3.0 ransomware on compromised systems, researchers have warned....
Cryptocurrency users are being targeted with a new clipper malware strain dubbed Laplas by means of another...
The National Cybersecurity Center of Excellence (NCCoE) has released a new final project description, Mitigating...
The U.S. Department of Justice (DoJ) on Monday said it seized 50,676 Bitcoin in November...
The news surrounding the slowing economy has many wondering how much of an impact it...
The malicious actor has threatened to release all data in 24 hours after their ransom...
The insurance provider raised concerns that paying the ransom would make other Australian companies bigger...
Australian health insurer Medibank today confirmed that personal data belonging to around 9.7 million of...
Facebook appears to have silently rolled out a tool that allows users to remove their...
Security researchers are warning of “a trove of sensitive information” leaking through urlscan.io, a website scanner...
A phishing-as-a-service (PhaaS) platform known as Robin Banks has relocated its attack infrastructure to DDoS-Guard, a Russian...
Cybersecurity researchers have uncovered 29 packages in Python Package Index (PyPI), the official third-party software...
Microsoft is warning of an uptick in the nation-state and criminal actors increasingly leveraging publicly-disclosed...
The Transparent Tribe threat actor has been linked to a new campaign aimed at Indian...
Not too long ago, there was a clear separation between the operational technology (OT) that...
In August 2021, NIST’s Crypto Publication Review Board initiated a review process for Federal Information...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published three Industrial Control Systems (ICS) advisories about...
A new analysis of tools put to use by the Black Basta ransomware operation has...
Every SaaS app user and login is a potential threat; whether it’s bad actors or...
A French-speaking threat actor dubbed OPERA1ER has been linked to a series of more than 30 successful...
The operators of RomCom RAT are continuing to evolve their campaigns with rogue versions of...
Popular short-form video-sharing service TikTok is revising its privacy policy for European users to make it explicitly...
The hacker posed as a trusted third party to gain access to employee login credentials...
Multiple vulnerabilities have been disclosed in Checkmk IT Infrastructure monitoring software that could be chained...
Seeking Feedback The National Cybersecurity Center of Excellence (NCCoE) has published for comment a draft...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.