Two more security flaws have been disclosed in AMI MegaRAC Baseboard Management Controller (BMC) software...
Multiple security flaws have been disclosed in Apache OpenMeetings, a web conferencing solution, that could...
An analysis of the indicators of compromise (IoCs) associated with the JumpCloud hack has uncovered...
If it seems like Remote Desktop Protocol (RDP) has been around forever, it’s because it...
The defense sector in Ukraine and Eastern Europe has been targeted by a novel .NET-based...
Cybersecurity researchers have uncovered a new cloud targeting, peer-to-peer (P2P) worm called P2PInfect that targets vulnerable Redis...
Microsoft on Wednesday announced that it’s expanding cloud logging capabilities to help organizations investigate cybersecurity...
Adobe has released a fresh round of updates to address an incomplete fix for a...
How to make sure your organisation is prepared for home working....
Attack surfaces are growing faster than security teams can keep up. To stay ahead, you...
U.S. cybersecurity and intelligence agencies have released a set of recommendations to address security concerns with 5G...
The prolific China-linked nation-state actor known as APT41 has been linked to two previously undocumented...
The data of 11 million patients was stolen and posted online...
On April 5, 2023, the FBI and Dutch National Police announced the takedown of Genesis Market,...
Cybersecurity researchers have uncovered a privilege escalation vulnerability in Google Cloud that could enable malicious...
The U.S. government on Tuesday added two foreign commercial spyware vendors, Cytrox and Intellexa, to...
Citrix is alerting users of a critical security flaw in NetScaler Application Delivery Controller (ADC) and Gateway...
An unidentified threat actor compromised an application used by multiple entities in Pakistan to deliver ShadowPad,...
In 2021, AARP found that identify theft had affected more than 42 million U.S. consumers....
Data associated with a subset of registered customers of VirusTotal, including their names and email...
Discover stories about threat actors’ latest tactics, techniques, and procedures from Cybersixgill’s threat experts each...
The financially motivated threat actor known as FIN8 has been observed using a “revamped” version...
Conor Brian Fitzpatrick, the owner of the now-defunct BreachForums website, has pleaded guilty to charges...
Threat actors are actively exploiting a recently disclosed critical security flaw in the WooCommerce Payments...
A little over a week after JumpCloud reset API keys of customers impacted by a security incident,...
Threat actors are taking advantage of Android’s WebAPK technology to trick unsuspecting users into installing malicious web...
The hype around different security categories can make it difficult to discern features and capabilities...
Cyber attacks using infected USB infection drives as an initial access vector have witnessed a...
Microsoft said that a “China-based threat actor with espionage objectives” was responsible for the hack...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.