Here are three of the worst breaches, attacker tactics and techniques of 2022, and the...
In a first-of-its-kind coordinated action, the U.K. and U.S. governments on Thursday levied sanctions against...
Popular social news aggregation platform Reddit has disclosed that it was the victim of a...
The NCSC’s threat report is drawn from recent open source reporting....
A set of 38 security vulnerabilities has been uncovered in wireless industrial internet of things...
The Hacker News is thrilled to announce the launch of our new educational webinar series,...
A previously unknown threat actor dubbed NewsPenguin has been linked to a phishing campaign targeting Pakistani entities...
9 Comments
A single ransomware attack on a New Zealand managed service provider (MSP) disrupted several of...
The Gootkit malware is prominently going after healthcare and finance organizations in the U.S., U.K.,...
The OpenSSL Project has released fixes to address several security flaws, including a high-severity bug...
The U.S. National Institute of Standards and Technology (NIST) has announced that a family of...
Multiple unpatched security flaws have been disclosed in open source and freemium Document Management System...
A Sydney man has been sentenced to an 18-month Community Correction Order (CCO) and 100 hours of...
If you google the definition for social engineering, you’ll probably find something like “the use...
The initial public draft of NIST Special Publication (SP) 800-201, NIST Cloud Computing Forensic Reference...
In August 2021, NIST’s Crypto Publication Review Board announced the review of NIST Special Publication...
A Russia-linked threat actor has been observed deploying a new information-stealing malware in cyber attacks...
To succeed as a cybersecurity analyst, you need to understand the traits, values, and thought...
A Russian national on February 7, 2023, pleaded guilty in the U.S. to money laundering...
The Computer Emergency Response Team of Ukraine (CERT-UA) has issued an alert warning of cyber attacks against...
A joint law enforcement operation conducted by Germany, the Netherlands, and Poland has cracked yet...
Threat actors are leveraging known flaws in Sunlogin software to deploy the Sliver command-and-control (C2)...
With cyberattacks around the world escalating rapidly, insurance companies are ramping up the requirements to...
The algorithms are designed to protect data created and transmitted by the Internet of Things...
The NIST Lightweight Cryptography Team has reviewed the finalists based on their submission packages, status...
The first-ever Linux variant of the Clop ransomware has been detected in the wild, but...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.