An old adage says: if you don’t have anything nice to say, say nothing at...
Hold onto your hats, folks, because the cybersecurity world is anything but quiet! Last week,...
Critical security vulnerabilities have been disclosed in six different Automatic Tank Gauge (ATG) systems from...
Attackers are increasingly turning to session hijacking to get around widespread MFA adoption. The data...
Imagine a sophisticated cyberattack cripples your organization’s most critical productivity and collaboration tool — the...
The Irish Data Protection Commission (DPC) has fined Meta €91 million ($101.56 million) as part...
Cybersecurity researchers have discovered a malicious Android app on the Google Play Store that enabled...
U.S. federal prosecutors on Friday unsealed criminal charges against three Iranian nationals who are allegedly...
Progress Software has released another round of updates to address six security flaws in WhatsUp...
A new set of security vulnerabilities has been disclosed in the OpenPrinting Common Unix Printing...
As security technology and threat awareness among organizations improves so do the adversaries who are...
The threat actor known as Storm-0501 has targeted government, manufacturing, transportation, and law enforcement sectors...
In today’s fast-evolving digital landscape, cybersecurity has become a cornerstone of organizational resilience. As cyber...
Russian-speaking users have been targeted as part of a new campaign distributing a commodity trojan...
The U.S. government on Thursday sanctioned two cryptocurrency exchanges and unsealed an indictment against a...
A critical security flaw has been disclosed in the NVIDIA Container Toolkit that, if successfully...
Cybersecurity researchers have disclosed a set of now patched vulnerabilities in Kia vehicles that, if...
Threat actors with ties to North Korea have been observed leveraging two new malware strains...
Imagine trying to find a needle in a haystack, but the haystack is on fire,...
Many businesses rely on the Common Vulnerability Scoring System (CVSS) to assess the severity of...
As many as 25 websites linked to the Kurdish minority have been compromised as part...
An advanced threat actor with an India nexus has been observed using multiple cloud service...
Nation-state threat actors backed by Beijing broke into a “handful” of U.S. internet service providers...
Google has revealed that its transition to memory-safe languages such as Rust as part of...
Vienna-based privacy non-profit noyb (short for None Of Your Business) has filed a complaint with...
Cybersecurity researchers have flagged the discovery of a new post-exploitation red team tool called Splinter...
Phishing attacks are becoming more advanced and harder to detect, but there are still telltale...
Security Orchestration, Automation, and Response (SOAR) was introduced with the promise of revolutionizing Security Operations...
A now-patched security vulnerability in OpenAI’s ChatGPT app for macOS could have made it possible...
Transportation and logistics companies in North America are the target of a new phishing campaign...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.