Do you know where your secrets are? If not, I can tell you: you are...
The Russia-affiliated Sandworm used yet another wiper malware strain dubbed NikoWiper as part of an attack that...
A shellcode-based packer dubbed TrickGate has been successfully operating without attracting notice for over six years, while enabling threat...
Taiwanese company QNAP has released updates to remediate a critical security flaw affecting its network-attached...
GitHub on Monday disclosed that unknown threat actors managed to exfiltrate encrypted code signing certificates...
A new Golang-based information stealer malware dubbed Titan Stealer is being advertised by threat actors through their...
Researchers are warning about a spike in exploitation attempts weaponizing a critical remote code execution...
The NCSC’s threat report is drawn from recent open source reporting....
The threat actors associated with the Gootkit malware have made “notable changes” to their toolset,...
Microsoft is urging customers to keep their Exchange servers updated as well as take steps...
The use of software as a service (SaaS) is experiencing rapid growth and shows no...
The Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the...
Ukraine has come under a fresh cyber onslaught from Russia that involved the deployment of...
Cybersecurity researchers have discovered the real-world identity of the threat actor behind Golden Chickens malware-as-a-service, who goes...
Cybersecurity researchers have uncovered a PlugX sample that employs sneaky methods to infect attached removable...
Orcus is a Remote Access Trojan with some distinctive characteristics. The RAT allows attackers to create...
The U.K. National Cyber Security Centre (NCSC) on Thursday warned of spear-phishing attacks mounted by...
Speakers: Danielle Santos Manager of Communications and Operations and Lead for International Engagement National Initiative...
Two separate lawsuits have been filed against the company for allegedly failing to protect customer...
The infrastructure associated with the Hive ransomware-as-a-service (RaaS) operation has been seized as part of...
Google on Thursday disclosed it took steps to dismantle over 50,000 instances of activity orchestrated...
Proof-of-concept (Poc) code has been released for a now-patched high-severity security flaw in the Windows...
New research has linked the operations of a politically motivated hacktivist group known as Moses...
Any organization that handles sensitive data must be diligent in its security efforts, which include...
Cybersecurity researchers have unearthed a new Python-based attack campaign that leverages a Python-based remote access...
At least two federal agencies in the U.S. fell victim to a “widespread cyber campaign”...
Andrew Roughan, CEO of the NCSC’s innovation partner Plexal, explains why a whole-of-society approach is...
A massive campaign has infected over 4,500 WordPress websites as part of a long-running operation...
Security stakeholders have come to realize that the prominent role the browser has in the...
NIST requests public comments on NIST IR 8214C ipd (initial public draft), NIST First Call...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.