The second generation version of Belkin’s Wemo Mini Smart Plug has been found to contain...
Cybersecurity researchers have unearthed previously undocumented attack infrastructure used by the prolific state-sponsored group SideWinder to strike...
A Russian national has been charged and indicted by the U.S. Department of Justice (DoJ)...
The Chinese nation-state actor known as Mustang Panda has been linked to a new set of sophisticated...
Theme : Consumer Fraud Education Download the Continuing Education Units form . The presentation slides...
Ransomware affiliates associated with the Qilin ransomware-as-a-service (RaaS) scheme earn anywhere between 80% to 85%...
Theme: Consumer Fraud Education Agenda: 8:00am – 9:00am Registration and Check-in 9:00am – 10:30am Opening...
Operational technology (OT) cybersecurity is a challenging but critical aspect of protecting organizations’ essential systems...
The threat actors behind the CopperStealer malware resurfaced with two new campaigns in March and...
A Golang implementation of Cobalt Strike called Geacon is likely to garner the attention of...
NCSC Deputy Director for Cyber Growth Chris Ensor explains how we have used the Cyber...
Several security vulnerabilities have been disclosed in cloud management platforms associated with three industrial cellular...
A new ransomware group known as RA Group has become the latest threat actor to leverage the...
It’s easy to think high-tech companies have a security advantage over other older, more mature...
Government, aviation, education, and telecom sectors located in South and Southeast Asia have come under...
A new ransomware-as-service (RaaS) operation called MichaelKors has become the latest file-encrypting malware to target...
Poorly managed Microsoft SQL (MS SQL) servers are the target of a new campaign that’s...
A former employee of Ubiquiti has been sentenced to six years in jail after he pleaded guilty...
NCSC’s cyber security Board Toolkit draws on industry expertise in a major update to the...
A new phishing-as-a-service (PhaaS or PaaS) platform named Greatness has been leveraged by cybercriminals to target business...
Cybersecurity researchers have discovered an ongoing phishing campaign that makes use of a unique attack...
As many as five security flaws have been disclosed in Netgear RAX30 routers that could...
A previously undocumented and mostly undetected variant of a Linux backdoor called BPFDoor has been spotted in...
In today’s interconnected world, where organisations regularly exchange sensitive information with customers, partners and employees,...
U.S. cybersecurity and intelligence agencies have warned of attacks carried out by a threat actor...
A security vulnerability has been disclosed in the popular WordPress plugin Essential Addons for Elementor that could...
A previously undetected advanced persistent threat (APT) actor dubbed Red Stinger has been linked to attacks targeting...
The National Police of Spain said it arrested 40 individuals for their alleged involvement in...
The data was stolen in a breach which took place earlier this year...
According to Forrester, External Attack Surface Management (EASM) emerged as a market category in 2021...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.