Charming Kitten, the nation-state actor affiliated with Iran’s Islamic Revolutionary Guard Corps (IRGC), has been...
In today’s fast-paced digital landscape, the widespread adoption of AI (Artificial Intelligence) tools is transforming...
The addresses of thousands of trademark applicants may have been accessed by malicious actors...
Meta’s WhatsApp has rolled out updates to its proxy feature, allowing more flexibility in the...
An active financially motivated campaign is targeting vulnerable SSH servers to covertly ensnare them into...
MITRE has released its annual list of the Top 25 “most dangerous software weaknesses” for...
Check that you’re talking to a genuine NCSC employee, and not a criminal....
The Iranian state-sponsored group dubbed MuddyWater has been attributed to a previously unseen command-and-control (C2)...
Cybersecurity researchers have shared the inner workings of an Android malware family called Fluhorse. The malware...
Cyber threat intelligence is an effective weapon in the ongoing battle to protect digital assets...
The North Korea-aligned threat actor known as Andariel leveraged a previously undocumented malware called EarlyRat...
Android-based phone monitoring app LetMeSpy has disclosed a security breach that allowed an unauthorized third-party...
A critical security flaw has been disclosed in miniOrange’s Social Login and Register plugin for WordPress that...
A previously undocumented Windows-based information stealer called ThirdEye has been discovered in the wild with capabilities to...
Drones that don’t have any known security weaknesses could be the target of electromagnetic fault...
Cybersecurity researchers have exposed the workings of a scam ring called CryptosLabs that’s estimated to...
For too long the cybersecurity world focused exclusively on information technology (IT), leaving operational technology...
Malicious actors are using a Trojanized game installer to steal victim’s data and install crypto...
A ransomware threat called 8Base that has been operating under the radar for over a...
Multiple SQL injection vulnerabilities have been disclosed in Gentoo Soko that could lead to remote...
5×5―the confirmation of a strong and clear signal. In 2023, it will also be a...
The cyber attack has taken a number of games offline including World of Warcraft and...
A new process injection technique dubbed Mockingjay could be exploited by threat actors to bypass...
Cybersecurity researchers have discovered a new ongoing campaign aimed at the npm ecosystem that leverages a...
As the business environment becomes increasingly connected, organizations’ attack surfaces continue to expand, making it...
Europol on Tuesday announced that the takedown of EncroChat in July 2020 led to 6,558 arrests worldwide...
A new Android malware campaign has been observed pushing the Anatsa banking trojan to target...
Fortinet has rolled out updates to address a critical security vulnerability impacting its FortiNAC network...
ThinkCyber’s CEO Tim Ward reflects on the challenges that startups face when developing innovative products....
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.