A security researcher was awarded a bug bounty of $107,500 for identifying security issues in...
1 Comment
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two-years-old security flaws impacting TIBCO Software’s JasperReports...
Thousands of Citrix Application Delivery Controller (ADC) and Gateway endpoints remain vulnerable to two critical...
Users searching for popular software are being targeted by a new malvertising campaign that abuses...
Decentralized multi-chain crypto wallet BitKeep on Wednesday confirmed a cyberattack that allowed threat actors to...
Microsoft’s decision to block Visual Basic for Applications (VBA) macros by default for Office files...
BlueNoroff, a subcluster of the notorious Lazarus Group, has been observed adopting new techniques into...
Meta Platforms, the parent company of Facebook, Instagram, and WhatsApp, has agreed to pay $725...
Cybersecurity researchers have exposed a wide variety of techniques adopted by an advanced malware downloader...
As we are nearing the end of 2022, looking at the most concerning threats of...
The pay-per-install (PPI) malware downloader service known as PrivateLoader is being used to distribute a...
Threat actors have published yet another round of malicious packages to Python Package Index (PyPI)...
The developers behind the Brave open-source web browser have revealed a new privacy-preserving data querying...
A malicious actor copied personal information from LastPass’ third-party cloud storage provider...
A new targeted phishing campaign has zoomed in on a two-factor authentication solution called Kavach...
Tis the season for security and IT teams to send out that company-wide email: “No,...
The Vice Society ransomware actors have switched to yet another custom ransomware payload in their...
France’s privacy watchdog has imposed a €60 million ($63.88 million) fine against Microsoft’s Ireland subsidiary...
The August 2022 security breach of LastPass may have been more severe than previously disclosed by the...
An exhaustive analysis of FIN7 has unmasked the cybercrime syndicate’s organizational hierarchy, alongside unraveling its role as...
We spent forty years defending ourselves as individuals. Trying to outsmart cybercriminals, outpower them, and...
Multiple high-severity vulnerabilities have been disclosed in Passwordstate password management solution that could be exploited...
Cybersecurity researchers have detailed two security flaws in the JavaScript-based blogging platform known as Ghost, one...
The Zerobot DDoS botnet has received substantial updates that expand on its ability to target more internet-connected...
Okta, a company that provides identity and access management services, disclosed on Wednesday that some...
The NCSC’s threat report is drawn from recent open source reporting....
The NCSC’s e-learning package ‘Top Tips For Staff’ can be completed online, or built into...
As 2022 comes to a close, stress can be at an all-time high. This time...
The Raspberry Robin worm has been used in attacks against telecommunications and government office systems across Latin...
More zero knowledge attacks, more leaked credentials, more Gen-Z cyber crimes – 2022 trends and...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.