Zyxel has released software updates to address two critical security flaws affecting select firewall and...
How cyber security start-up Trust Stamp capitalised on the CA programme....
A hospital with 2,000 employees in the E.U. deployed Cynet protections across its environment. The...
An unnamed government entity associated with the United Arab Emirates (U.A.E.) was targeted by a...
How to set up and use video conferencing services, such as Zoom and Skype, safely...
A Brazilian threat actor is targeting Portuguese financial institutions with information-stealing malware as part of...
In today’s digital landscape, browser security has become an increasingly pressing issue, making it essential...
The threat actors behind the nascent Buhti ransomware have eschewed their custom payload in favor of leaked...
The data was stolen following a cyber attack against a third-party supplier...
A stealthy China-based group managed to establish a persistent foothold into critical infrastructure organizations in...
The Iranian threat actor known as Agrius is leveraging a new ransomware strain called Moneybird in its...
Google on Wednesday announced the 0.1 Beta version of GUAC (short for Graph for Understanding Artifact Composition) for organizations...
NCSC publishes free e-learning to help organisations manage the cyber security risks across their supply...
The data for sale includes the names, addresses and contact details of 1.5 million customers...
At least eight websites associated with shipping, logistics, and financial services companies in Israel were...
If you’re involved in securing the applications your organization develops, there is no question that...
Google has removed a screen recording app named “iRecorder – Screen Recorder” from the Play...
An updated version of the commodity malware called Legion comes with expanded features to compromise...
The infamous Lazarus Group actor has been targeting vulnerable versions of Microsoft Internet Information Services...
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks targeting state...
This year’s Multi-Cloud Conference hosted by NIST, Department of Commerce (DOC), and Tetrate will focus...
This year’s Multi-Cloud Conference hosted by NIST, DOC, and Tetrate will focus on delivering Zero...
A new initiative, aimed at 11 to 14-year-olds, that helps them navigate the risks of...
Government and diplomatic entities in the Middle East and South Asia are the target of...
The North Korean advanced persistent threat (APT) group known as Kimsuky has been observed using...
The most precious asset in today’s information age is the secret safeguarded under lock and...
An unknown threat actor has been observed leveraging a malicious Windows kernel driver in attacks...
China has banned U.S. chip maker Micron from selling its products to Chinese companies working...
The fine was issued after and investigation into Meta’s transfers of personal data to the...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.