Nearly three dozen counterfeit packages have been discovered in the npm package repository that are...
APIs, also known as application programming interfaces, serve as the backbone of modern software applications,...
Security Configuration Assessment (SCA) is critical to an organization’s cybersecurity strategy. SCA aims to discover vulnerabilities...
Volume 1 – 2023 September Volume 2 – Q4 2023 – November Volume 3 –...
Firewall and distributed denial-of-service (DDoS) attack prevention mechanisms in Cloudflare can be circumvented by exploiting...
Arm has released security patches to contain a security flaw in the Mali GPU Kernel...
Introduction In today’s interconnected digital ecosystem, Application Programming Interfaces (APIs) play a pivotal role in...
LUCR-3 overlaps with groups such as Scattered Spider, Oktapus, UNC3944, and STORM-0875 and is a...
A financially motivated campaign has been targeting online payment businesses in the Asia Pacific, North...
The most impactful cyber attacks and data breaches from across the world in September 2023...
A high-severity security flaw has been disclosed in the open-source OpenRefine data cleanup and transformation...
Cybersecurity experts have discovered yet another malware-as-a-service (MaaS) threat called BunnyLoader that’s being advertised for sale on...
An emerging Android banking trojan called Zanubis is now masquerading as a Peruvian government app...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.