Android smartphone users in India are the target of a new malware campaign that employs...
The China-linked Mustang Panda actor has been linked to a cyber attack targeting a Philippines...
Reflecting on the positive impact of the Vulnerability Reporting Service – and introducing something new...
Threat actors are targeting the education, government and business services sectors with a remote access...
Phishing campaigns delivering malware families such as DarkGate and PikaBot are following the same tactics...
In this article, we will provide a brief overview of Silverfort’s platform, the first (and...
The National Institute of Standards and Technology Human-Centered Cybersecurity program is pleased to announce the...
Today’s security leaders must manage a constantly evolving attack surface and a dynamic threat environment...
Salary plays a key role in retaining cyber security talent and building successful security strategies,...
The stealer malware known as LummaC2 (aka Lumma Stealer) now features a new anti-sandbox technique that leverages...
Bitcoin wallets created between 2011 and 2015 are susceptible to a new kind of exploit...
An Indian hack-for-hire group targeted the U.S., China, Myanmar, Pakistan, Kuwait, and other countries as...
The threat actors behind the 8Base ransomware are leveraging a variant of the Phobos ransomware to conduct...
Russian cyber espionage actors affiliated with the Federal Security Service (FSB) have been observed using...
Toyota Financial Services identified unauthorized activity on its systems...
Threat actors are leveraging manipulated search results and bogus Google ads that trick users who...
The U.S. Federal Communications Commission (FCC) is adopting new rules that aim to protect consumers...
In 2023, the cloud isn’t just a technology—it’s a battleground. Zenbleed, Kubernetes attacks, and sophisticated...
An unknown threat actor has been observed publishing typosquat packages to the Python Package Index...
U.S. cybersecurity and intelligence agencies have released a joint advisory about a cybercriminal group known...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added three security flaws to...
The NCSC has published a new RFC on Indicators of Compromise to support cyber security...
A zero-day flaw in the Zimbra Collaboration email software was exploited by four different groups...
A hacking group that leveraged a recently disclosed security flaw in the WinRAR software as...
BlackCat/APLHV claimed that alleged victim MeridianLink has failed to comply with a new four-day cyber...
The threat actors behind the Rhysida ransomware engage in opportunistic attacks targeting organizations spanning various industry sectors....
A set of novel attack methods has been demonstrated against Google Workspace and the Google...
According to recent research on employee offboarding, 70% of IT professionals say they’ve experienced the negative...
Russian threat actors have been possibly linked to what’s been described as the “largest cyber...
The U.S. government on Tuesday announced the takedown of the IPStorm botnet proxy network and...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.