Details have emerged about a now-patched vulnerability in Google Chrome and Chromium-based browsers that, if...
A recently published Security Navigator report data shows that businesses are still taking 215 days to patch...
Twitter on Wednesday said that its investigation found “no evidence” that users’ data sold online...
Malicious actors are actively attempting to exploit a recently patched critical vulnerability in Control Web...
The Draft Fourth Revision to NIST Special Publication 800-63, Digital Identity Guidelines (Draft NIST SP...
A new analysis of Raspberry Robin’s attack infrastructure has revealed that it’s possible for other threat actors...
A wave of Gootkit malware loader attacks has targeted the Australian healthcare sector by leveraging...
Are you looking to take your career in the information security industry to the next...
Government and military organizations in the Asia Pacific region are being targeted by a previously...
The first Patch Tuesday fixes shipped by Microsoft for 2023 have addressed a total of 98...
How malicious parties are using AI chatbots to help power cyber crime...
The advanced persistent threat (APT) group known as StrongPity has targeted Android users with a trojanized version...
A comprehensive analysis of the cryptographic protocols used in the Swiss encrypted messaging application Threema...
A new malware campaign has been observed targeting Italy with phishing emails designed to deploy...
NIST is announcing the initial public drafts of NIST SP 800-157r1 (Revision 1), Guidelines for...
A high-severity security flaw has been disclosed in the open source jsonwebtoken (JWT) library that,...
Andrew A explains what you must check before giving Managed Service Providers (MSPs) the keys...
The threat actors behind the Kinsing cryptojacking operation have been spotted exploiting misconfigured and exposed PostgreSQL servers...
A group of academics has demonstrated novel attacks that leverage Text-to-SQL models to produce malicious...
Earlier this year, threat actors infiltrated Mailchimp, the popular SaaS email marketing platform. They viewed over...
Multiple bugs affecting millions of vehicles from 16 different manufacturers could be abused to unlock,...
In yet another campaign targeting the Python Package Index (PyPI) repository, six malicious packages have...
Cybercriminals will be as busy as ever this year. Stay safe and protect your systems...
A new attack vector targeting the Visual Studio Code extensions marketplace could be leveraged to...
The Russian cyberespionage group known as Turla has been observed piggybacking on attack infrastructure used...
A South Africa-based threat actor known as Automated Libra has been observed employing CAPTCHA bypass...
Microsoft has shed light on four different ransomware families – KeRanger, FileCoder, MacRansom, and EvilQuest –...
A variant of the infamous Dridex banking malware has set its sights on Apple’s macOS...
NIST is in the process of a periodic review and maintenance of its cryptography standards...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.