The 2023/2024 Axur Threat Landscape Report provides a comprehensive analysis of the latest cyber threats....
A previously undocumented China-aligned threat actor has been linked to a set of adversary-in-the-middle (AitM)...
CounterCraft’s co-founder, Dan Brett, explains how they turn the tables so that social engineering can...
A new Go-based malware loader called CherryLoader has been discovered by threat hunters in the wild to...
Hackers with links to the Kremlin are suspected to have infiltrated information technology company Hewlett...
Cybersecurity researchers have discovered a loophole impacting Google Kubernetes Engine (GKE) that could be potentially...
In today’s highly distributed workplace, every employee has the ability to act as their own...
The ransomware group known as Kasseika has become the latest to leverage the Bring Your...
In a world where more & more organizations are adopting open-source components as foundational blocks...
Governments from Australia, the U.K., and the U.S. have imposed financial sanctions on a Russian...
A critical security flaw has been disclosed in Fortra’s GoAnywhere Managed File Transfer (MFT) software...
The threat actors behind ClearFake, SocGholish, and dozens of other actors have established partnerships with...
Two malicious packages discovered on the npm package registry have been found to leverage GitHub...
Cracked software have been observed infecting Apple macOS users with a previously undocumented stealer malware...
As we enter 2024, Gcore has released its latest Gcore Radar report, a twice-annual publication...
Conor Brian Fitzpatrick has been sentenced to time served and 20 years of supervised release...
Malicious actors have begun to actively exploit a recently disclosed critical security flaw impacting Atlassian...
Can an equivalent cyber security standard deliver the same outcomes as the NCSC’s Cyber Essentials...
Apple on Monday released security updates for iOS, iPadOS, macOS, tvOS, and Safari web browser...
Media organizations and high-profile experts in North Korean affairs have been at the receiving end...
Several public and popular libraries abandoned but still used in Java and Android applications have...
An NCSC assessment focusing on how AI will impact the efficacy of cyber operations and...
Cybersecurity researchers have discovered a new Java-based “sophisticated” information stealer that uses a Discord bot...
We analyzed 2,5 million vulnerabilities we discovered in our customer’s assets. This is what we...
The U.S. Federal Trade Commission (FTC) is continuing to clamp down on data brokers by...
Cybersecurity researchers are warning of a “notable increase” in threat actor activity actively exploiting a...
An advanced China-nexus cyber espionage group previously linked to the exploitation of security flaws in...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday issued an emergency directive urging Federal Civilian...
Microsoft on Friday revealed that it was the target of a nation-state attack on its...
The threat actor tracked as TA866 has resurfaced after a nine-month hiatus with a new large-volume phishing...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.