Cybersecurity researchers have discovered an improved version of an Apple iOS spyware called LightSpy that...
LottieFiles has revealed that its npm package “lottie-player” was compromised as part of a supply...
In the modern, browser-centric workplace, the corporate identity acts as the frontline defense for organizations....
A high-severity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that...
Threat actors in North Korea have been implicated in a recent incident that deployed a...
A now-patched security flaw in the Opera web browser could have enabled a malicious extension...
Cybersecurity researchers have uncovered an ongoing malvertising campaign that abuses Meta’s advertising platform and hijacked...
Cybersecurity researchers have discovered a new malicious Python package that masquerades as a cryptocurrency trading...
Navigating the complexities of compliance frameworks like ISO 27001, SOC 2, or GDPR can be...
NIST’s Cherilyn Pascoe and Ron Ross, as well as the Post Quantum Cryptography Standards project...
NCSC-assured CRA service now offering Cyber Assessment Framework based audits and more applications invited from...
A little over three dozen security vulnerabilities have been disclosed in various open-source artificial intelligence...
Sherlock Holmes is famous for his incredible ability to sort through mounds of information; he...
The Dutch National Police, along with international partners, have announced the disruption of the infrastructure...
The U.S. government (USG) has issued new guidance governing the use of the Traffic Light...
More than six years after the Spectre security flaw impacting modern CPU processors came to...
A government entity and a religious organization in Taiwan were the target of a China-linked...
A suspected Russian hybrid espionage and influence operation has been observed delivering a mix of...
Three malicious packages published to the npm registry in September 2024 have been found to...
Cybersecurity news can sometimes feel like a never-ending horror movie, can’t it? Just when you...
Cybersecurity researchers have warned of a spike in phishing pages created using a website builder...
Operational Technology (OT) security has affected marine vessel and port operators, since both ships and...
A new attack technique could be used to bypass Microsoft’s Driver Signature Enforcement (DSE) on...
The infamous cryptojacking group known as TeamTNT appears to be readying for a new large-scale...
Four members of the now-defunct REvil ransomware operation have been sentenced to several years in...
The Computer Emergency Response Team of Ukraine (CERT-UA) has detailed a new malicious email campaign...
A security flaw impacting the Wi-Fi Test Suite could enable unauthenticated local attackers to execute...
Apple has publicly made available its Private Cloud Compute (PCC) Virtual Research Environment (VRE), allowing...
After over a year of evaluation, NIST has selected 14 candidates for the second round...
Artificial Intelligence (AI) has rapidly evolved from a futuristic concept to a potent weapon in...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.