An unnamed European Ministry of Foreign Affairs (MFA) and its three diplomatic missions in the...
The awards will fund research and development of new products relating to cybersecurity, quantum computing,...
Here’s How to Enhance Your Cyber Resilience with CVSS In late 2023, the Common Vulnerability...
A malware botnet called Ebury is estimated to have compromised 400,000 Linux servers since 2009, out of...
While cloud adoption has been top of mind for many IT professionals for nearly a...
A Dutch court on Tuesday sentenced one of the co-founders of the now-sanctioned Tornado Cash cryptocurrency...
Microsoft has addressed a total of 61 new security flaws in its software as part of its Patch...
Multiple security flaws have been disclosed in VMware Workstation and Fusion products that could be exploited by...
Google on Monday shipped emergency fixes to address a new zero-day flaw in the Chrome...
Contractors and other organizations that do business with the federal government now have clearer, more...
The maintainers of the Cacti open-source network monitoring and fault management framework have addressed a dozen security...
Deploying advanced authentication measures is key to helping organizations address their weakest cybersecurity link: their human users....
Cybersecurity researchers have uncovered an ongoing social engineering campaign that bombards enterprises with spam emails with...
Apple and Google on Monday officially announced the rollout of a new feature that notifies...
The MITRE Corporation has officially made available a new threat-modeling framework called EMB3D for makers of embedded...
With the browser becoming the most prevalent workspace in the enterprise, it is also turning into a...
In the last decade, there has been a growing disconnect between front-line analysts and senior...
Cybersecurity researchers have disclosed multiple security flaws in Cinterion cellular modems that could be potentially...
The Black Basta ransomware-as-a-service (RaaS) operation has targeted more than 500 private industry and critical...
Join the community of service providers helping to protect the UK from cyber attacks....
Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot of...
The financially motivated threat actor known as FIN7 has been observed leveraging malicious Google ads spoofing legitimate brands as a...
The North Korean threat actor tracked as Kimsuky has been observed deploying a previously undocumented...
Artificial intelligence (AI) is transforming cybersecurity, and those leading the charge are using it to...
Google on Thursday released security updates to address a zero-day flaw in Chrome that it...
A guide to finding the right endpoint detection and response (EDR) solution for your business’ unique needs....
Malicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X (formerly Twitter) have been...
Cybersecurity researchers have discovered a novel attack that employs stolen cloud credentials to target cloud-hosted...
Researchers have detailed a Virtual Private Network (VPN) bypass technique dubbed TunnelVision that allows threat actors to...
Polish government institutions have been targeted as part of a large-scale malware campaign orchestrated by...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.