A new post-exploitation framework called EXFILTRATOR-22 (aka EX-22) has emerged in the wild with the...
Romanian cybersecurity company Bitdefender has released a free decryptor for a new ransomware strain known as MortalKombat. MortalKombat...
As digital transformation takes hold and businesses become increasingly reliant on digital services, it has...
The threat actor known as Blind Eagle has been linked to a new campaign targeting...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity flaw affecting the ZK Framework...
LastPass, which in December 2022 disclosed a severe data breach that allowed threat actors to...
The RIG exploit kit (EK) touched an all-time high successful exploitation rate of nearly 30%...
Spoiler Alert: Organizations with 10,000 SaaS users that use M365 and Google Workspace average over...
A new ChromeLoader malware campaign has been observed being distributed via virtual hard disk (VHD)...
Government entities in Asia-Pacific and North America are being targeted by an unknown threat actor...
Guidance on development and deployment of secure communications protocols in connected systems....
The PlugX remote access trojan has been observed masquerading as an open source Windows debugger tool called...
The Dutch police announced the arrest of three individuals in connection with a “large-scale” criminal...
In our third blog about migrating to a zero trust architecture, we consider the security...
Two ways organisations can enable access and maintain the security benefits of zero trust even...
Google said it’s working with ecosystem partners to harden the security of firmware that interacts...
Are you prepared to tackle the top SaaS challenges of 2023? With high-profile data breaches...
The use of AI in cybersecurity is growing rapidly and is having a significant impact...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is urging organizations and individuals to increase...
An investigation into data safety labels for Android apps available on the Google Play Store...
The NCSC’s threat report is drawn from recent open source reporting....
Trojanized versions of legitimate applications are being used to deploy evasive cryptocurrency mining malware on...
Multiple threat actors have been observed opportunistically weaponizing a now-patched critical security vulnerability impacting several...
The (Other) Risk in Finance A few years ago, a Washington-based real estate developer received...
Materials research organizations in Asia have been targeted by a previously unknown threat actor using...
Detailed virtual copies of physical objects are opening doors for better products across automotive, health...
A new backdoor associated with a malware downloader named Wslink has been discovered, with the tool likely...
An active malware campaign has set its sights on Facebook and YouTube users by leveraging...
Cybersecurity researchers are warning of “imposter packages” mimicking popular libraries available on the Python Package...
1 Comment
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.