The threat actor known as Arid Viper (aka APT-C-23, Desert Falcon, or TAG-63) has been attributed as...
Cybersecurity researchers have uncovered a new set of malicious packages published to the NuGet package...
In the ever-evolving cybersecurity landscape, the game-changers are those who adapt and innovate swiftly. Pen...
Atlassian has warned of a critical security flaw in Confluence Data Center and Server that...
A new malvertising campaign has been observed capitalizing on a compromised website to promote spurious versions of...
Canada on Monday announced a ban on the use of apps from Tencent and Kaspersky...
Meta on Monday announced plans to offer an ad-free option to access Facebook and Instagram...
A pro-Hamas hacktivist group has been observed using a new Linux-based wiper malware dubbed BiBi-Linux Wiper,...
Modern web app development relies on cloud infrastructure and containerization. These technologies scale on demand,...
Earlier this week, ServiceNow announced on its support site that misconfigurations within the platform could result in...
A new ongoing campaign dubbed EleKtra-Leak has set its eyes on exposed Amazon Web Service (AWS) identity...
Three unpatched high-severity security flaws have been disclosed in the NGINX Ingress controller for Kubernetes that could...
A new cyber attack campaign has been observed using spurious MSIX Windows app package files for popular...
New findings have shed light on what’s said to be a lawful attempt to covertly...
The North Korea-aligned Lazarus Group has been attributed as behind a new campaign in which an unnamed...
When organizations start incorporating cybersecurity regulations and cyber incident reporting requirements into their security protocols,...
Google has announced that it’s expanding its Vulnerability Rewards Program (VRP) to reward researchers for...
Czech government and airport websites affected by cyber attack...
F5 has alerted customers of a critical security vulnerability impacting BIG-IP that could result in...
The US Cybersecurity and Infrastructure Security Agency have relaunched an updated version of LME....
A group of academics has devised a novel side-channel attack dubbed iLeakage that exploits a weakness in...
The prolific threat actor known as Scattered Spider has been observed impersonating newly hired employees in targeted...
Cloudflare on Thursday said it mitigated thousands of hyper-volumetric HTTP distributed denial-of-service (DDoS) attacks that...
While cyberattacks on websites receive much attention, there are often unaddressed risks that can lead...
The Iranian threat actor known as Tortoiseshell has been attributed to a new wave of watering hole...
Users of Mirth Connect, an open-source data integration platform from NextGen HealthCare, are being urged to...
A relatively new threat actor known as YoroTrooper is likely made of operators originating from Kazakhstan. The...
Launching the first phase rollout of a protective DNS service for schools....
The threat actor known as Winter Vivern has been observed exploiting a zero-day flaw in Roundcube webmail...
Critical security flaws have been disclosed in the Open Authorization (OAuth) implementation of popular online...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.