The maintainers of the open-source file-sharing software ownCloud have warned of three critical security flaws...
More details have emerged about a malicious Telegram bot called Telekopye that’s used by threat actors to...
The title of this article probably sounds like the caption to a meme. Instead, this...
Cybersecurity researchers have shed light on a Rust version of a cross-platform backdoor called SysJoker, which...
Cybersecurity researchers are warning of publicly exposed Kubernetes configuration secrets that could put organizations at...
The Canadian government has disclosed a data breach after contractor hacks exposed information dating back...
A new phishing attack has been observed leveraging a Russian-language Microsoft Word document to deliver...
Delivery- and shipping-themed email messages are being used to deliver a sophisticated malware loader known...
Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints...
An active malware campaign is leveraging two zero-day vulnerabilities with remote code execution (RCE) functionality...
A North Korean state-sponsored threat actor tracked as Diamond Sleet is distributing a trojanized version of a...
Russian-speaking affiliate of notorious ransomware group tracked using Google Ads to spread Nitrogen malware...
CISA, FBI and MS-ISAC publish joint cyber security advisory revealing Rhysida’s indicators of compromise and...
Emerging ransomware group claims to have stolen data from the British Library...
New venture will offer select security software solutions, associated managed security operations and security consulting...
Multiple Play (aka PlayCrypt) ransomware attacks detected using nearly identical tactics, techniques and procedures...
A new research has uncovered multiple vulnerabilities that could be exploited to bypass Windows Hello authentication on...
Exposed data includes Social Security numbers and bank account information of Idaho National Laboratory workers....
The Cyber Advisor scheme has been gaining momentum since its launch six months ago –...
North Korean threat actors have been linked to two campaigns in which they masquerade as...
New cyber security advisory warns of active exploitation of CVE-2023-4966 which affects Citrix NetScaler web...
Ambitious Employees Tout New AI Tools, Ignore Serious SaaS Security RisksLike the SaaS shadow IT of the...
Many everyday items are now connected to the internet: we explain how to use them...
The macOS information stealer known as Atomic is now being delivered to target via a...
Multiple threat actors, including LockBit ransomware affiliates, are actively exploiting a recently disclosed critical security flaw in...
The ransomware strain known as Play is now being offered to other threat actors “as a service,”...
At Social-Engineer, we define impersonation as “the practice of pretexting as another person with the...
A new variant of the Agent Tesla malware has been observed delivered via a lure file with...
Phishing attacks are steadily becoming more sophisticated, with cybercriminals investing in new ways of deceiving...
The Kinsing threat actors are actively exploiting a critical security flaw in vulnerable Apache ActiveMQ servers to...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.