Multiple security vulnerabilities have been disclosed in the runC command line tool that could be...
Ivanti is alerting of two new high-severity flaws in its Connect Secure and Policy Secure...
Cybersecurity researchers are calling attention to the “democratization” of the phishing ecosystem owing to the...
The SEC isn’t giving SaaS a free pass. Applicable public companies, known as “registrants,” are...
A financially motivated threat actor known as UNC4990 is leveraging weaponized USB devices as an initial infection...
A pair of recently disclosed zero-day flaws in Ivanti Connect Secure (ICS) virtual private network...
New NCSC guidance describes how organisations can make the most of containerisation....
Malicious local attackers can obtain full root access on Linux machines by taking advantage of...
A Brazilian law enforcement operation has led to the arrest of several Brazilian operators in...
GitLab once again released fixes to address a critical security flaw in its Community Edition...
The China-based threat actor known as Mustang Panda is suspected to have targeted Myanmar’s Ministry of Defence...
Each New Year introduces a new set of challenges and opportunities for strengthening our cybersecurity...
Italy’s data protection authority (DPA) has notified ChatGPT-maker OpenAI of supposedly violating privacy laws in...
Threat hunters have identified a new campaign that delivers the ZLoader malware, resurfacing nearly two years after...
Juniper Networks has released out-of-band updates to address high-severity flaws in SRX Series and EX Series that...
A now-patched security flaw in Microsoft Outlook could be exploited by threat actors to access...
In today’s digital world, security risks are more prevalent than ever, especially when it comes...
In nearly every segment of our lives, AI (artificial intelligence) now makes a significant impact:...
Cybersecurity researchers have detected in the wild yet another variant of the Phobos ransomware family...
The U.S. National Security Agency (NSA) has admitted to buying internet browsing records from data...
Cybersecurity researchers have identified malicious packages on the open-source Python Package Index (PyPI) repository that...
Mexican financial institutions are under the radar of a new spear-phishing campaign that delivers a...
Medieval castles stood as impregnable fortresses for centuries, thanks to their meticulous design. Fast forward...
Chinese-speaking users have been targeted by malicious Google ads for restricted messaging apps like Telegram...
Microsoft on Thursday said the Russian state-sponsored threat actors responsible for a cyber attack on its...
40-year-old Russian national Vladimir Dunaev has been sentenced to five years and four months in...
Cisco has released patches to address a critical security flaw impacting Unified Communications and Contact...
Cybersecurity researchers have shed light on the command-and-control (C2) server of a known malware family...
The maintainers of the open-source continuous integration/continuous delivery and deployment (CI/CD) automation software Jenkins have...
Cybersecurity researchers have uncovered an updated version of a backdoor called LODEINFO that’s distributed via spear-phishing attacks....
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.