Cybersecurity researchers have demonstrated a new technique that exploits a critical security flaw in Apache...
UK must accelerate work to keep pace with the evolving CNI threat landscape...
What do basketball teams, government agencies, and car manufacturers have in common? Each one has...
Generative AI will be used to enhance social engineering with more zero-day vulnerabilities employed by...
Intel has released fixes to close out a high-severity flaw codenamed Reptar that impacts its desktop, mobile,...
Microsoft has released fixes to address 63 security bugs in its software for the month of November...
VMware is warning of a critical and unpatched security flaw in Cloud Director that could...
A group of academics has disclosed a new “software fault attack” on AMD’s Secure Encrypted...
Aerospace giant refused to give in to ransom demands following a cyber attack late last...
In 2023, the global average cost of a data breach reached $4.45 million. Beyond the immediate...
Publicly-accessible Docker Engine API instances are being targeted by threat actors as part of a...
Have you heard about Dependabot? If not, just ask any developer around you, and they’ll...
Government entities in the Middle East are the target of new phishing campaigns that are...
The Vietnamese threat actors behind the Ducktail stealer malware have been linked to a new...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has given a November 17, 2023, deadline...
The threat actors behind a new ransomware group called Hunters International have acquired the source code and...
Effective marketing operations today are driven by the use of Software-as-a-Service (SaaS) applications. Marketing apps...
Cybersecurity researchers have discovered what they say is malicious cyber activity orchestrated by two prominent...
Malaysian law enforcement authorities have announced the takedown of a phishing-as-a-service (PhaaS) operation called BulletProofLink. The Royal Malaysian...
Cybersecurity researchers have warned about a Windows version of a wiper malware that was previously...
A sub-cluster within the infamous Lazarus Group has established new infrastructure that impersonates skills assessment...
The notorious Russian hackers known as Sandworm targeted an electrical substation in Ukraine last year, causing a...
There is a seemingly never-ending quest to find the right security tools that offer the...
Cybersecurity researchers have discovered a stealthy backdoor named Effluence that’s deployed following the successful exploitation of a...
A group with links to Iran targeted transportation, logistics, and technology sectors in the Middle...
Urdu-speaking readers of a regional news website that caters to the Gilgit-Baltistan region have likely...
The threat actor known as Lace Tempest has been linked to the exploitation of a...
A new malvertising campaign has been found to employ fake sites that masquerade as legitimate Windows news...
While intended for convenience and efficient communication, email auto-forwarding rules can inadvertently lead to the...
Iranian nation-state actors have been observed using a previously undocumented command-and-control (C2) framework called MuddyC2Go as part...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.