Regulatory compliance is no longer just a concern for large enterprises. Small and mid-sized businesses...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity security flaw impacting...
The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of a new campaign that...
Threat actors are exploiting a severe security flaw in PHP to deliver cryptocurrency miners and...
The recently leaked trove of internal chat logs among members of the Black Basta ransomware...
In today’s digital world, security breaches are all too common. Despite the many security tools...
The threat actors behind the ClearFake campaign are using fake reCAPTCHA or Cloudflare Turnstile verifications...
Activities which organisations must carry out to migrate safely to post-quantum cryptography in the coming...
Identity-based attacks are on the rise. Attackers are targeting identities with compromised credentials, hijacked authentication...
Why the key milestones for PQC migration are part of building and maintaining good cyber...
Cybersecurity researchers have disclosed details of two critical flaws impacting mySCADA myPRO, a Supervisory Control...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a vulnerability linked to...
Cybersecurity researchers have disclosed details of a new supply chain attack vector dubbed Rules File...
An unpatched security flaw impacting Microsoft Windows has been exploited by 11 state-sponsored groups from...
Google is making the biggest ever acquisition in its history by purchasing cloud security company...
A critical security vulnerability has been disclosed in AMI’s MegaRAC Baseboard Management Controller (BMC) software...
Many of us don’t realize just how much we share about ourselves on the internet....
Cybersecurity researchers have warned about a large-scale ad fraud campaign that has leveraged hundreds of...
While Okta provides robust native security features, configuration drift, identity sprawl, and misconfigurations can provide...
Threat hunters have shed more light on a previously disclosed malware campaign undertaken by the...
At least four different threat actors have been identified as involved in an updated version...
Microsoft is calling attention to a novel remote access trojan (RAT) named StilachiRAT that it...
A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation in the...
An unpatched security flaw impacting the Edimax IC-7100 network camera is being exploited by threat...
As 5G rolls out more widely, we must safeguard the technology from cyberattacks since 5G...
Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to style and format...
From sophisticated nation-state campaigns to stealthy malware lurking in unexpected places, this week’s cybersecurity landscape...
The latest Palo Alto Networks Unit 42 Cloud Threat Report found that sensitive data is...
Cybersecurity researchers are calling attention to an incident in which the popular GitHub Action tj-actions/changed-files...
Guidance for risk assessors, and developers of applications which will be run on devices handling...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.