The advanced persistent threat (APT) actor known as Winter Vivern is now targeting officials in...
The Cyber Police of Ukraine, in collaboration with law enforcement officials from Czechia, has arrested...
Organizations rely on Incident response to ensure they are immediately aware of security incidents, allowing for quick...
Enterprise communications software maker 3CX on Thursday confirmed that multiple versions of its desktop app...
Details have emerged about a now-patched vulnerability in Azure Service Fabric Explorer (SFX) that could...
A Chinese state-sponsored threat activity group tracked as RedGolf has been attributed to the use of a custom Windows...
The data stolen included personal information such as passport and Medicare numbers...
A group of academics from Northeastern University and KU Leuven has disclosed a fundamental design...
Multi-cloud data storage, once merely a byproduct of the great cloud migration, has now become...
A new “comprehensive toolset” called AlienFox is being distributed on Telegram as a way for threat actors...
3CX said it’s working on a software update for its desktop app after multiple cybersecurity vendors sounded...
Lindy Cameron, CEO, introduces changes to the NCSC’s cyber security resources specifically designed for board...
A number of zero-day vulnerabilities that were addressed last year were exploited by commercial spyware...
An unknown Chinese state-sponsored hacking group has been linked to a novel piece of malware...
The emergence of smart mobility services and applications has led to a sharp increase in...
Malware analysis is an essential part of security researcher’s work. But working with malicious samples...
Twitter issued an DMCA takedown notice to GitHub to get the source code removed...
Trojanized installers for the TOR anonymity browser are being used to target users in Russia...
A new North Korean nation-state cyber operator has been attributed to a series of campaigns...
Catherine H reflects on how the changes to the refreshed Assured Cyber Security Consultancy scheme...
Microsoft on Tuesday unveiled Security Copilot in preview, marking its continued push to embed AI-oriented features in an...
An advanced persistent threat (APT) group that has a track record of targeting India and...
Multiple threat actors have been observed using two new variants of the IcedID malware in the wild...
Malicious actors are constantly adapting their tactics, techniques, and procedures (TTPs) to adapt to political,...
A new phishing campaign has set its sights on European entities to distribute Remcos RAT...
U.S. President Joe Biden on Monday signed an executive order that restricts the use of commercial spyware...
Apple on Monday backported fixes for an actively exploited security flaw to older iPhone and...
Conor Brian Fitzpatrick, the 20-year-old founder and the administrator of the now-defunct BreachForums has been formally...
Single sign-on (SSO) is an authentication method that allows users to authenticate their identity for...
A new information-stealing malware has set its sights on Apple’s macOS operating system to siphon...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.