The persistent threat actors behind the SolarMarker information-stealing malware have established a multi-tiered infrastructure to complicate law...
Doug Montgomery (CTL/ Internet Technologies Research Group) participated t in the NSF Workshop on Policy-Relevant...
One of the enduring challenges of building modern applications is to make them more secure...
File Integrity Monitoring (FIM) is an IT security control that monitors and detects file changes...
A critical security flaw has been disclosed in the llama_cpp_python Python package that could be exploited by...
Microsoft on Monday confirmed its plans to deprecate NT LAN Manager (NTLM) in Windows 11...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a security flaw impacting NextGen Healthcare Mirth...
Cybersecurity researchers have discovered a critical security flaw in a popular logging and metrics utility...
An Iranian threat actor affiliated with the Ministry of Intelligence and Security (MOIS) has been...
Multiple threat actors are weaponizing a design flaw in Foxit PDF Reader to deliver a...
All developers want to create secure and dependable software. They should feel proud to release...
A “multi-faceted campaign” has been observed abusing legitimate services like GitHub and FileZilla to deliver...
How to disrupt targeted phishing attacks aimed at senior executives or budget holders....
Cybersecurity researchers have observed a spike in email phishing campaigns starting early March 2024 that...
The U.S. Department of Justice (DoJ) has charged two arrested Chinese nationals for allegedly orchestrating...
The threat actors behind the Windows-based Grandoreiro banking trojan have returned in a global campaign since March...
The cryptojacking group known as Kinsing has demonstrated its ability to continuously evolve and adapt, proving to...
A new report from XM Cyber has found – among other insights – a dramatic gap between...
Cybersecurity researchers have shed more light on a remote access trojan (RAT) known as Deuterbear...
The Kimsuky (aka Springtail) advanced persistent threat (APT) group, which is linked to North Korea’s Reconnaissance General...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting D-Link routers...
Researchers have discovered a new security vulnerability stemming from a design flaw in the IEEE...
The North Korea-linked Kimsuky hacking group has been attributed to a new social engineering attack that employs...
Security researchers have disclosed almost a dozen security flaws impacting the GE HealthCare Vivid Ultrasound...
The Microsoft Threat Intelligence team said it has observed a threat it tracks under the name Storm-1811 abusing...
Google has rolled out fixes to address a set of nine security issues in its Chrome browser,...
Law enforcement agencies have officially seized control of the notorious BreachForums platform, an online bazaar known for...
Google has announced a slew of privacy and security features in Android, including a suite...
Google is unveiling a set of new features in Android 15 to prevent malicious apps...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.