A new collection of eight process injection techniques, collectively dubbed PoolParty, could be exploited to achieve...
Researchers from the Vrije Universiteit Amsterdam have disclosed a new side-channel attack called SLAM that could be...
Threat hunters have unmasked the latest tricks adopted by a malware strain called GuLoader in an effort...
A collection of security flaws in the firmware implementation of 5G mobile network modems from...
The North Korean threat actor known as Kimsuky has been observed targeting research institutes in South Korea...
Cyber security decision-makers and practitioners plan to reduce headcounts in response to budget headwinds...
Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cybersecurity. Among...
Star Blizzard has targeted academia, defense, governmental organizations and politicians with spear phishing campaigns...
Unauthorized websites distributing trojanized versions of cracked software have been found to infect Apple macOS...
WordPress has released version 6.4.2 with a patch for a critical security flaw that could...
BlackCat/ALPHV ransomware group leaked photos of what appears to be stolen passports, contact lists, emails...
The Russian founder of the now-defunct Bitzlato cryptocurrency exchange has pleaded guilty, nearly 11 months...
Alert fatigue leaves security professionals struggling to know which vulnerabilities to fix first...
Researchers warn of a sharp increase in phishing emails carrying Adobe InDesign links...
The threat actor known as COLDRIVER has continued to engage in credential theft activities against...
A critical Bluetooth security flaw could be exploited by threat actors to take control of...
Humans are complex beings with consciousness, emotions, and the capacity to act based on thoughts....
Law firms increasingly targeted by cyber criminal groups that specialize in business email compromise...
Threat intelligence refers to gathering, processing, and analyzing cyber threats, along with proactive defensive measures...
Unspecified governments have demanded mobile push notification records from Apple and Google users to pursue...
A previously unknown Linux remote access trojan called Krasue has been observed targeting telecom companies...
Meta has officially begun to roll out support for end-to-end encryption (E2EE) in Messenger for personal calls...
Just three US federal agencies have reached the required cyber security incident response standards...
Security incidents are being triggered by employees using messaging apps in business environments...
Threat actors can take advantage of Amazon Web Services Security Token Service (AWS STS) as...
Compromising the browser is a high-return target for adversaries. Browser extensions, which are small software...
A collection of 21 security flaws have been discovered in Sierra Wireless AirLink cellular routers...
Threat actor leveraging patched vulnerabilities to send high-volume campaigns to targets in Europe and North...
In an increasingly complex and fast-paced digital landscape, organizations strive to protect themselves from various...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of active exploitation of a high-severity Adobe...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.