A coalition of international law enforcement agencies has seized the website associated with the cryptocurrency...
Safe{Wallet} has revealed that the cybersecurity incident that led to the Bybit $1.5 billion crypto...
Threat actors of unknown provenance have been attributed to a malicious campaign predominantly targeting organizations...
Elastic has rolled out security updates to address a critical security flaw impacting the Kibana...
The financially motivated threat actor known as EncryptHub has been observed orchestrating sophisticated phishing campaigns...
The threat actors behind the Medusa ransomware have claimed nearly 400 victims since it first...
Using differential privacy can help organizations glean useful insights from databases while protecting individuals’ data....
Cyber threats are growing more sophisticated, and traditional security approaches struggle to keep up. Organizations...
Over 1,000 websites powered by WordPress have been infected with a third-party JavaScript code that...
Vulnerability Scanning solutions offer a cost-effective way to discover and manage common security issues....
The U.S. Department of Justice (DoJ) has announced charges against 12 Chinese nationals for their...
We publish the results of our ACD 2.0 external attack surface management (EASM) trials...
The China-lined threat actor behind the zero-day exploitation of security flaws in Microsoft Exchange servers...
USB drive attacks constitute a significant cybersecurity risk, taking advantage of the everyday use of...
NIST will host a full-day workshop at the NCCoE to continue discussions related to a...
The threat actor known as Dark Caracal has been attributed to a campaign that deployed...
Google has announced the rollout of artificial intelligence (AI)-powered scam detection features to secure Android...
The threat actor known as Lotus Panda has been observed targeting government, manufacturing, telecommunications, and...
The rapid adoption of cloud services, SaaS applications, and the shift to remote work have...
Using the cloud securely should be your primary concern – not the underlying security of...
Raising a cheer for SaaS vendors who respond to our cloud security principles....
Non-email sending (parked) domains can be used to generate spam email, but they’re easy to...
…or ‘Why do people leave sensitive data in unprotected AWS S3 buckets?’...
Remote system administration provides powerful and flexible access to systems and services....
Cybersecurity researchers are alerting of an ongoing malicious campaign targeting the Go ecosystem with typosquatted...
Threat actors deploying the Black Basta and CACTUS ransomware families have been found to rely...
Broadcom has released security updates to address three actively exploited security flaws in VMware ESXi,...
Simon Arnell, co-founder of Configured Things, describes how the NCSC For Startups programme helped the...
Credential stuffing attacks had a huge impact in 2024, fueled by a vicious circle of...
Threat hunters are calling attention to a new highly-targeted phishing campaign that singled out “fewer...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.