A six-month-long international police operation codenamed HAECHI-IV has resulted in the arrests of nearly 3,500 individuals and...
A new Go-based information stealer malware called JaskaGO has emerged as the latest cross-platform threat to infiltrate...
The U.S. Justice Department (DoJ) has officially announced the disruption of the BlackCat ransomware operation and released...
Cybersecurity researchers have shed light on the inner workings of the ransomware operation led by...
Threat actors are increasingly making use of GitHub for malicious purposes through novel methods, including...
Responses will be accepted until Feb. 2, 2024....
The grants will go to 15 small businesses in nine states under NIST’s Small Business...
Some of you have already started budgeting for 2024 and allocating funds to security areas...
The Iranian nation-state actor known as MuddyWater has leveraged a newly discovered command-and-control (C2) framework called MuddyC2Go...
The malware loader known as PikaBot is being distributed as part of a malvertising campaign targeting users searching...
The threat actors associated with the 8220 Gang have been observed exploiting a high-severity flaw in Oracle...
The threat actors behind the Play ransomware are estimated to have impacted approximately 300 entities...
As 2023 comes to an end, it brings along with it a time many people...
Technical details have emerged about two now-patched security flaws in Microsoft Windows that could be...
Over the past few years, SaaS has developed into the backbone of corporate IT. Service...
The developers of the information stealer malware known as Rhadamanthys are actively iterating on its features, broadening...
Four U.S. nationals have been charged for participating in an illicit scheme that earned them...
Low-code/no-code (LCNC) and robotic process automation (RPA) have gained immense popularity, but how secure are...
A new wave of phishing messages distributing the QakBot malware has been observed, more than three months...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is urging manufacturers to get rid of default passwords...
Questions to ask your suppliers that will help you gain confidence in their cyber security....
MongoDB on Saturday disclosed it’s actively investigating a security incident that has led to unauthorized...
China’s Ministry of Industry and Information Technology (MIIT) on Friday unveiled draft proposals detailing its plans to...
Microsoft is warning of an uptick in malicious activity from an emerging threat cluster it’s...
A new botnet consisting of firewalls and routers from Cisco, DrayTek, Fortinet, and NETGEAR is...
Crypto hardware wallet maker Ledger published a new version of its “@ledgerhq/connect-kit” npm module after...
Web Application Security consists of a myriad of security controls that ensure that a web...
Multiple security vulnerabilities have been discovered in the open-source Netgate pfSense firewall solution called pfSense...
How to avoid malware sent using scam ‘missed parcel’ SMS messages, and what to do...
Powerful attack knocked out internet access and mobile communications, damaging IT infrastructure...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.