The threat actors behind the zero-day exploitation of a recently-patched security vulnerability in Microsoft Windows...
New proposals will combat the growing threat to UK critical national infrastructure (CNI)....
Threat actors are using the “mu-plugins” directory in WordPress sites to conceal malicious code with...
Every week, someone somewhere slips up—and threat actors slip in. A misconfigured setting, an overlooked...
If you’re using AWS, it’s easy to assume your cloud security is handled – but...
Entities in Ukraine have been targeted as part of a phishing campaign designed to distribute...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware...
Cybersecurity researchers have discovered a new Android banking malware called Crocodilus that’s primarily designed to...
In what’s an instance of hacking the hackers, threat hunters have managed to infiltrate the...
Cybersecurity researchers have disclosed 46 new security flaws in products from three solar inverter vendors,...
Cybersecurity researchers are calling attention to a new sophisticated malware called CoffeeLoader that’s designed to...
Long gone are the days when a simple backup in a data center was enough...
An Android malware family previously observed targeting Indian military personnel has been linked to a...
Cybersecurity researchers have discovered several cryptocurrency packages on the npm registry that have been hijacked...
Mozilla has released updates to address a critical security flaw impacting its Firefox browser for...
Cybersecurity researchers have shed light on a new phishing-as-a-service (PhaaS) platform that leverages the Domain...
A new analysis has uncovered connections between affiliates of RansomHub and other ransomware groups like...
An advanced persistent threat (APT) group with ties to Pakistan has been attributed to the...
Whether it’s CRMs, project management tools, payment processors, or lead management tools – your workforce...
Hackers have long used Word and Excel documents as delivery vehicles for malware, and in...
An ongoing campaign that infiltrates legitimate websites with malicious JavaScript injects to promote Chinese-language gambling...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two six-year-old security flaws impacting...
A critical security flaw has been disclosed in NetApp SnapCenter that, if successfully exploited, could...
The Chinese threat actor known as FamousSparrow has been linked to a cyber attack targeting...
The threat actor known as EncryptHub exploited a recently-patched security vulnerability in Microsoft Windows as...
The Russian-speaking hacking group called RedCurl has been linked to a ransomware campaign for the...
Cybersecurity researchers have discovered two malicious packages on the npm registry that are designed to...
“A boxer derives the greatest advantage from his sparring partner…” — Epictetus, 50–135 AD Hands...
When people think of cybersecurity threats, they often picture external hackers breaking into networks. However,...
Threat actors are leveraging an e-crime tool called Atlantis AIO Multi-Checker to automate credential stuffing...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.