The P2PInfect peer-to-peer (P2) worm has been observed employing previously undocumented initial access methods to...
Malicious actors are using Call of Duty lobbies to spread worm malware...
Threat actors associated with the hacking crew known as Patchwork have been spotted targeting universities...
Demand for Virtual CISO services is soaring. According to Gartner, the use of vCISO services...
More details have emerged about a botnet called AVRecon, which has been observed making use of...
Threat actors are creating fake websites hosting trojanized software installers to trick unsuspecting users into...
Multiple security vulnerabilities have been disclosed in the Ninja Forms plugin for WordPress that could...
A new Android malware strain called CherryBlos has been observed making use of optical character recognition (OCR)...
Increasing cyber threats and attacks have made protecting organizational data a paramount concern for businesses...
Apple has announced plans to require developers to submit reasons to use certain APIs in...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday disclosed details of a “novel...
Ivanti has disclosed yet another security flaw impacting Endpoint Manager Mobile (EPMM), formerly known as...
The threat actors linked to the malware loader known as IcedID have made updates to...
An ongoing cyber attack campaign has set its sights on Korean-speaking individuals by employing U.S....
As part of Checkmarx’s mission to help organizations develop and deploy secure software, the Security Research team...
A legitimate Windows search feature is being exploited by malicious actors to download arbitrary payloads...
The Russian nation-state actor known as BlueBravo has been observed targeting diplomatic entities throughout Eastern Europe with...
Users of Metabase, a popular business intelligence and data visualization software package, are being advised...
Cybersecurity agencies in Australia and the U.S. have published a joint cybersecurity advisory warning against security flaws...
The victim of a credential stuffing attack is facing legal action after malicious actors took...
Cybersecurity researchers have disclosed two high-severity security flaws in the Ubuntu kernel that could pave...
A new malvertising campaign has been observed leveraging ads on Google Search and Bing to...
As cloud applications are built, tested and updated, they wind their way through an ever-complex...
Misconfigured and poorly secured Apache Tomcat servers are being targeted as part of a new...
A city court in Moscow on Wednesday convicted Group-IB co-founder and CEO Ilya Sachkov of...
The U.S. Securities and Exchange Commission (SEC) on Wednesday approved new rules that require publicly...
Managing ‘unknown assets’ that are used within an organisation....
New guidance to help organisations manage rogue devices and services within the enterprise....
A deeper analysis of a recently discovered malware called Decoy Dog has revealed that it’s a significant...
Twelve government ministries have been impacted by a supply chain cyber attack...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.