Internet-exposed Selenium Grid instances are being targeted by bad actors for illicit cryptocurrency mining and...
NIST Special Publication (SP) 800-50r1 (Revision 1), Building a Cybersecurity and Privacy Learning Program, provides...
Cato CTRL (Cyber Threats Research Lab) has released its Q2 2024 Cato CTRL SASE Threat...
Iraqi government networks have emerged as the target of an “elaborate” cyber attack campaign orchestrated...
The Irish Data Protection Commission (DPC) has announced that it has commenced a “Cross-Border statutory...
WordPress.org has announced a new account security measure that will require accounts with capabilities to...
The operators of the mysterious Quad7 botnet are actively evolving by compromising several brands of...
A “simplified Chinese-speaking actor” has been linked to a new campaign that has targeted multiple...
The Singapore Police Force (SPF) has announced the arrest of five Chinese nationals and one...
Imagine a world where you never have to remember another password. Seems like a dream...
Cybersecurity researchers have uncovered a new set of malicious Python packages that target software developers...
Can a Software Bill of Materials (SBOM) provide organisations with better insight into their supply...
Microsoft on Tuesday disclosed that three new security flaws impacting the Windows platform have come...
Ivanti has released software updates to address multiple security flaws impacting Endpoint Manager (EPM), including...
The threat actor known as CosmicBeetle has debuted a new custom ransomware strain called ScRansom...
A trio of threat activity clusters linked to China has been observed compromising more government...
Shadow apps, a segment of Shadow IT, are SaaS applications purchased without the knowledge of...
A new side-channel attack dubbed PIXHELL could be abused to target air-gapped computers by breaching...
The threat actor tracked as Mustang Panda has refined its malware arsenal to include new...
A novel side-channel attack has been found to leverage radio signals emanated by a device’s...
The proliferation of cybersecurity tools has created an illusion of security. Organizations often believe that...
The Colombian insurance sector is the target of a threat actor tracked as Blind Eagle...
The China-linked advanced persistent threat (APT) group known as Mustang Panda has been observed weaponizing...
GenAI has become a table stakes tool for employees, due to the productivity gains and...
Designed to be more than a one-time assessment— Wing Security’s SaaS Pulse provides organizations with...
Progress Software has released security updates for a maximum-severity flaw in LoadMaster and Multi-Tenant (MT)...
Android device users in South Korea have emerged as a target of a new mobile...
A previously undocumented threat actor with likely ties to Chinese-speaking groups has predominantly singled out...
The U.S. government and a coalition of international partners have officially attributed a Russian hacking...
Threat actors affiliated with North Korea have been observed leveraging LinkedIn as a way to...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.