A number of state-back threat actors from Russia and China have been observed exploiting a...
Speakers: Jasmine M. Jackson Application Security Engineer Founder and Executive Director The Accelerated Training Program...
The North Korea-linked Lazarus Group (aka Hidden Cobra or TEMP.Hermit) has been observed using trojanized versions of...
Citrix is warning of exploitation of a recently disclosed critical security flaw in NetScaler ADC...
A threat actor, presumably from Tunisia, has been linked to a new campaign targeting exposed...
In the ever-evolving landscape of cybersecurity, attackers are always searching for vulnerabilities and exploits within...
The malware, which can exfiltrate login credentials and other personal information, is directly targeting Android...
Government entities in the Asia-Pacific (APAC) region are the target of a long-running cyber espionage...
A medium-severity flaw has been discovered in Synology’s DiskStation Manager (DSM) that could be exploited...
Taiwanese networking equipment manufacturer D-Link has confirmed a data breach that led to the exposure...
Speakers: Danielle Santos Manager of Communications and Operations and Lead for International Engagement NICE (Moderator)...
In what’s the latest evolution of threat actors abusing legitimate infrastructure for nefarious ends, new...
Two critical security flaws discovered in the open-source CasaOS personal cloud software could be successfully exploited by...
You need a new chair for your desk. You’re looking for features such as arm...
Financial data is much more than just a collection of numbers; it is a crucial...
Recently, the cybersecurity landscape has been confronted with a daunting new reality – the rise...
A severity flaw impacting industrial cellular routers from Milesight may have been actively exploited in...
The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed that threat actors “interfered” with...
Cisco has warned of a critical, unpatched security flaw impacting IOS XE software that’s under...
Helping to make cloud backups resistant to the effects of destructive ransomware....
Introducing a new set of NCSC principles to strengthen the resilience of organisations’ cloud backups...
Pro-Russian hacking groups have exploited a recently disclosed security vulnerability in the WinRAR archiving utility...
The Android banking trojan known as SpyNote has been dissected to reveal its diverse information-gathering features. Typically...
SaaS Security’s roots are in configuration management. An astounding 35% of all security breaches begin...
Since the 2017 cyber attack, Equifax has invested $1.5 billion in a security and technology...
Encrypted messaging app Signal has pushed back against “viral reports” of an alleged zero-day flaw...
Threat actors have been observed serving malicious code by utilizing Binance’s Smart Chain (BSC) contracts...
Microsoft has announced that it plans to eliminate NT LAN Manager (NTLM) in Windows 11 in the...
European Union military personnel and political leaders working on gender equality initiatives have emerged as...
The advanced persistent threat (APT) actor known as ToddyCat has been linked to a new set of...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.