A financially motivated threat actor is actively scouring the internet for unprotected Apache NiFi instances to covertly...
Cybersecurity researchers have found “backdoor-like behavior” within Gigabyte systems, which they say enables the UEFI firmware of...
Improperly deactivated and abandoned Salesforce Sites and Communities (aka Experience Cloud) could pose severe risks to organizations, leading to...
This week, NIST released the newly redesigned and streamlined Special Publication 800-225, Fiscal Year (FY)...
Microsoft has shared details of a now-patched flaw in Apple macOS that could be abused...
Finding threat actors before they find you is key to beefing up your cyber defenses....
The threat actor known as Dark Pink has been linked to five new attacks aimed at various...
A database containing the personal information of members of RaidForums was posted to the dark...
The threat actors behind RomCom RAT are leveraging a network of fake websites advertising rogue versions of...
Enterprise security firm Barracuda on Tuesday disclosed that a recently patched zero-day flaw in its...
Multiple security flaws uncovered in Sonos One wireless speakers could be potentially exploited to achieve...
Cybersecurity researchers are warning about CAPTCHA-breaking services that are being offered for sale to bypass...
In this day and age, vulnerabilities in software and systems pose a considerable danger to...
A new open source remote access trojan (RAT) called DogeRAT targets Android users primarily located in India...
Researchers have discovered an inexpensive attack technique that could be leveraged to brute-force fingerprints on...
A crypter (alternatively spelled cryptor) malware dubbed AceCryptor has been used to pack numerous strains of malware...
If you’re a cybersecurity professional, you’re likely familiar with the sea of acronyms our industry...
Linux routers in Japan are the target of a new Golang remote access trojan (RAT)...
A new phishing technique called “file archiver in the browser” can be leveraged to “emulate”...
The Python Package Index (PyPI) announced last week that every account that maintains a project...
A new stealthy information stealer malware called Bandit Stealer has caught the attention of cybersecurity...
A critical security vulnerability has been disclosed in the Open Authorization (OAuth) implementation of the...
A new security flaw has been disclosed in the Google Cloud Platform’s (GCP) Cloud SQL...
Security researchers have shared a deep dive into the commercial Android spyware called Predator, which...
5G is a game changer for mobile connectivity, including mobile connectivity to the cloud. The...
A Dutch data protection watchdog has said that Tesla may have failed to protect confidential...
A new strain of malicious software that’s engineered to penetrate and disrupt critical systems in...
Email protection and network security services provider Barracuda is warning users about a zero-day flaw...
A new botnet called Dark Frost has been observed launching distributed denial-of-service (DDoS) attacks against the gaming...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.