As the field of artificial intelligence (AI) continues to evolve at a rapid pace, new...
How Many Gaps Are Hiding in Your Identity System? It’s not just about logins anymore....
A China-aligned advanced persistent threat (APT) group called TheWizards has been linked to a lateral...
Everyone has cybersecurity stories involving family members. Here’s a relatively common one. The conversation usually...
Cybersecurity researchers have shed light on a Russian-speaking cyber espionage group called Nebulous Mantis that...
Cybersecurity researchers have revealed that RansomHub’s online infrastructure has “inexplicably” gone offline as of April...
Meta on Tuesday announced LlamaFirewall, an open-source framework designed to secure artificial intelligence (AI) systems...
A high court in the Indian state of Karnataka has ordered the blocking of end-to-end...
Popular messaging app WhatsApp on Tuesday unveiled a new technology called Private Processing to enable...
Various generative artificial intelligence (GenAI) services have been found vulnerable to two types of jailbreak...
Cybersecurity company SentinelOne has revealed that a China-nexus threat cluster dubbed PurpleHaze conducted reconnaissance attempts...
Find out how Reco keeps Microsoft 365 Copilot safe by spotting risky prompts, protecting data,...
Google has revealed that it observed 75 zero-day vulnerabilities exploited in the wild in 2024,...
In a new campaign detected in March 2025, senior members of the World Uyghur Congress...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two high-severity security flaws...
What happens when cybercriminals no longer need deep skills to breach your defenses? Today’s attackers...
Not every security vulnerability is high risk on its own – but in the hands...
Government and telecommunications sectors in Southeast Asia have become the target of a “sophisticated” campaign...
Cybersecurity researchers are warning about a large-scale phishing campaign targeting WooCommerce users with a fake...
Threat actors have been observed exploiting two newly disclosed critical security flaws in Craft CMS...
Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted password spraying...
Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that...
North Korea-linked threat actors behind the Contagious Interview have set up front companies as a...
A new NCSC paper discusses the suitability of emerging Advanced Cryptography techniques....
Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload JSP web...
When we talk about identity in cybersecurity, most people think of usernames, passwords, and the...
Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server interface that,...
Cybersecurity researchers are warning about a new malware called DslogdRAT that’s installed following the exploitation...
At least six organizations in South Korea have been targeted by the prolific North Korea-linked...
Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a Linux asynchronous...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.