Facebook’s parent company Meta has been fined a record $1.3 billion by European Union data...
A financially motivated threat actor of Indonesian origin has been observed leveraging Amazon Web Services...
New findings about a hacker group linked to cyber attacks targeting companies in the Russo-Ukrainian...
It’s no secret that data leaks have become a major concern for both citizens and...
A U.K. national responsible for his role as the administrator of the now-defunct iSpoof online phone number...
A proof-of-concept (PoC) has been made available for a security flaw impacting the KeePass password...
Victims of DDoS attacks launched by these sites include financial institutions, school districts, government websites...
The maintainers of Python Package Index (PyPI), the official third-party software repository for the Python...
The identity of the second threat actor behind the Golden Chickens malware has been uncovered...
The notorious cybercrime group known as FIN7 has been observed deploying Cl0p (aka Clop) ransomware, marking the...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of active exploitation of a medium-severity...
Google has announced plans to officially flip the switch on its twice-delayed Privacy Sandbox initiatives as it...
Active Directory (AD) is among the oldest pieces of software still used in the production...
Two malicious packages discovered in the npm package repository have been found to conceal an...
A cloud misconfiguration caused Toyota’s customer data to be available for more than 10 years...
Malicious Google Search ads for generative AI services like OpenAI ChatGPT and Midjourney are being...
Apple on Thursday rolled out security updates to iOS, iPadOS, macOS, tvOS, watchOS, and the Safari web...
A cybercrime enterprise known as Lemon Group is leveraging millions of pre-infected Android smartphones worldwide to carry...
Cybersecurity is constantly evolving, but complexity can give hostile actors an advantage. To stay ahead...
Digitalization initiatives are connecting once-isolated Operational Technology (OT) environments with their Information Technology (IT) counterparts....
The rising geopolitical tensions between China and Taiwan in recent months have sparked a noticeable uptick in cyber...
The notorious cryptojacking group tracked as 8220 Gang has been spotted weaponizing a six-year-old security flaw in...
A U.S. national has pleaded guilty in a Missouri court to operating a darknet carding...
Apple has announced that it prevented over $2 billion in potentially fraudulent transactions and rejected...
Cisco has released updates to address a set of nine security flaws in its Small...
Want security that works better for people? Make it accessible....
A hacking group dubbed OilAlpha with suspected ties to Yemen’s Houthi movement has been linked to a cyber espionage...
Two scammers are currently being prosecuted for deploying a romance scam against at least two...
Software is rarely a one-and-done proposition. In fact, any application available today will likely need...
A financially motivated cyber actor has been observed abusing Microsoft Azure Serial Console on virtual machines (VMs)...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.