Threat actors are resorting to YouTube videos featuring content related to cracked software in order...
Threat actors operating under the name Anonymous Arabic have released a remote access trojan (RAT)...
How to set up online (or ‘cloud’) services so they’re protected against common cyber attacks....
How to defend your organisation from email phishing attacks....
Cybersecurity is an infinite journey in a digital landscape that never ceases to change. According...
Digital expansion inevitably increases the external attack surface, making you susceptible to cyberthreats. Threat actors...
The U.S. National Institute of Standards and Technology (NIST) is calling attention to the privacy and...
The U.S. Department of Justice (DoJ) said it charged 19 individuals worldwide in connection with...
Threat actors affiliated with the Democratic People’s Republic of Korea (also known as North Korea)...
Telecommunication, media, internet service providers (ISPs), information technology (IT)-service providers, and Kurdish websites in the...
The recent wave of cyber attacks targeting Albanian organizations involved the use of a wiper called No-Justice. The findings come...
Cybersecurity researchers have discovered a new Apple macOS backdoor called SpectralBlur that overlaps with a known malware...
Detect and prevent malicious software and viruses on your computer or laptop....
Picture this: you stumble upon a concealed secret within your company’s source code. Instantly, a...
Mobile network operator Orange Spain suffered an internet outage for several hours on January 3...
Unauthorized access disrupted audio visual in-court technology network impacting video recordings, audio recordings and transcription...
Ivanti has released security updates to address a critical flaw impacting its Endpoint Manager (EPM)...
Ukrainian cybersecurity authorities have disclosed that the Russian state-sponsored threat actor known as Sandworm was inside telecom...
A new variant of remote access trojan called Bandook has been observed being propagated via phishing attacks...
Section four of the “Executive Order on Improving the Nation’s Cybersecurity” introduced a lot of...
Three new malicious packages have been discovered in the Python Package Index (PyPI) open-source repository...
The threat actor known as UAC-0050 is leveraging phishing attacks to distribute Remcos RAT using...
American cybersecurity firm and Google Cloud subsidiary Mandiant had its X (formerly Twitter) account compromised...
Information stealing malware are actively taking advantage of an undocumented Google OAuth endpoint named MultiLogin...
As technology adoption has shifted to be employee-led, just in time, and from any location...
A new exploitation technique called Simple Mail Transfer Protocol (SMTP) smuggling can be weaponized by...
The U.S. Department of Justice (DoJ) on Tuesday said it reached a settlement with VoIP...
What would you say are some traits of someone who is empathic? I would say...
Security stakeholders have come to realize that the prominent role the browser has in the...
Google has agreed to settle a lawsuit filed in June 2020 that alleged that the company misled...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.