In today’s digital landscape, around 60% of corporate data now resides in the cloud, with Amazon S3...
VMware has released security updates to address a critical flaw in the vCenter Server that...
The popularity of Brazil’s PIX instant payment system has made it a lucrative target for threat actors looking to...
Allow your website to accept pasted passwords – it makes your site more secure, not...
Virtualization services provider VMware has alerted customers to the existence of a proof-of-concept (PoC) exploit...
A former employee of the U.S. National Security Agency (NSA) has pleaded guilty to charges...
Spanish law enforcement officials have announced the arrest of 34 members of a criminal group that carried...
While application development has evolved rapidly, the API management suites used to access these services...
The TriangleDB implant used to target Apple iOS devices packs in at least four different...
The backdoor implanted on Cisco devices by exploiting a pair of zero-day flaws in IOS...
Popular password management solution 1Password said it detected suspicious activity on its Okta instance on...
With the record-setting growth of consumer-focused AI productivity tools like ChatGPT, artificial intelligence—formerly the realm...
The threat actor known as DoNot Team has been linked to the use of a novel .NET-based...
1. Continuous Automated Red Teaming (CART) 2. Build operate transfer (BOT) Security Operational Centers (SOC)...
The open-source remote access trojan known as Quasar RAT has been observed leveraging DLL side-loading to fly...
Europol on Friday announced the takedown of the infrastructure associated with Ragnar Locker ransomware, alongside...
Identity services provider Okta on Friday disclosed a new security incident that allowed unidentified threat...
Cisco has warned of a new zero-day flaw in IOS XE that has been actively...
Details have emerged about a malvertising campaign that leverages Google Ads to direct users searching...
Attacks leveraging the DarkGate commodity malware targeting entities in the U.K., the U.S., and India...
MxD, the digital manufacturing and cybersecurity institute, announced a new partnership with the National Institute...
Due to the rapid evolution of technology, the Internet of Things (IoT) is changing the...
A new information stealer named ExelaStealer has become the latest entrant to an already crowded landscape filled with various...
The U.S. government has announced the seizure of 17 website domains used by North Korean information technology...
23andMe is reviewing the leaked data to determine if it is legitimate...
An updated version of a sophisticated backdoor framework called MATA has been used in attacks aimed at...
The time between a vulnerability being discovered and hackers exploiting it is narrower than ever...
Google has announced an update to its Play Protect with support for real-time scanning at...
The Iran-linked OilRig threat actor targeted an unnamed Middle East government between February and September 2023 as...
North Korean threat actors are actively exploiting a critical security flaw in JetBrains TeamCity to...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.