An open-source .NET-based information stealer malware dubbed SapphireStealer is being used by multiple entities to enhance its...
Three additional malicious Python packages have been discovered in the Package Index (PyPI) repository as...
How often do cyberattacks happen? How frequently do threat actors target businesses and governments around...
A hacking outfit nicknamed Earth Estries has been attributed to a new, ongoing cyber espionage campaign targeting...
New findings show that malicious actors could leverage a sneaky malware detection evasion technique and...
A previously undocumented Android banking trojan dubbed MMRat has been observed targeting mobile users in Southeast Asia...
Cybersecurity researchers have discovered malicious Android apps for Signal and Telegram distributed via the Google...
Both health and financial information may have been accessed during the hack into PurFood’s systems...
ChatGPT and similar large language models (LLMs) have added further complexity to the ever-growing online...
An unknown threat actor is leveraging malicious npm packages to target developers with an aim...
Recently disclosed security flaws impacting Juniper firewalls, Openfire, and Apache RocketMQ servers have come under...
VMware has released software updates to correct two security vulnerabilities in Aria Operations for Networks...
A coordinated law enforcement effort codenamed Operation Duck Hunt has felled QakBot, a notorious Windows malware family that’s...
Large Language Models are an exciting technology, but our understanding of them is still ‘in...
Why established cyber security principles are still important when developing or implementing machine learning models....
A suspected Chinese-nexus hacking group exploited a recently disclosed zero-day flaw in Barracuda Networks Email Security Gateway...
A new malspam campaign has been observed deploying an off-the-shelf malware called DarkGate. “The current...
Ask any security professional and they’ll tell you that remediating risks from various siloed security...
Unpatched Citrix NetScaler systems exposed to the internet are being targeted by unknown threat actors...
Microsoft is warning of an increase in adversary-in-the-middle (AiTM) phishing techniques, which are being propagated...
Cybersecurity researchers have discovered a case of privilege escalation associated with a Microsoft Entra ID...
In yet another sign that developers continue to be targets of software supply chain attacks,...
Cyber attacks on e-commerce applications are a common trend in 2023 as e-commerce businesses become...
An updated version of a botnet malware called KmsdBot is now targeting Internet of Things (IoT) devices,...
The leak of the LockBit 3.0 ransomware builder last year has led to threat actors abusing the...
Risk and financial advisory solutions provider Kroll on Friday disclosed that one of its employees...
Two U.K. teenagers have been convicted by a jury in London for being part of...
When your security policies conflict with business requirements, staff’s willingness to break the rules may...
In today’s digital landscape, your business data is more than just numbers—it’s a powerhouse. Imagine...
Every company has some level of tech debt. Unless you’re a brand new start-up, you...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.