Organizations across industries are experiencing significant escalations in cyberattacks, particularly targeting critical infrastructure providers and...
Cybersecurity researchers have discovered a new phishing campaign that’s being used to distribute malware called...
Microsoft on Tuesday shipped fixes to address a total of 78 security flaws across its...
Fortinet has patched a critical security flaw that it said has been exploited as a...
Ivanti has released security updates to address two security flaws in Endpoint Manager Mobile (EPMM)...
A recently disclosed critical security flaw impacting SAP NetWeaver is being exploited by multiple China-nexus...
Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that...
The cybersecurity landscape has been dramatically reshaped by the advent of generative AI. Attackers now...
The North Korea-linked threat actor known as Konni APT has been attributed to a phishing...
Moldovan law enforcement authorities have arrested a 45-year-old foreign man suspected of involvement in a...
A Türkiye-affiliated threat actor exploited a zero-day security flaw in an Indian enterprise communication platform...
ASUS has released updates to address two security flaws impacting ASUS DriverHub that, if successfully...
What do a source code editor, a smart billboard, and a web server have in...
Detecting leaked credentials is only half the battle. The real challenge—and often the neglected half...
Threat actors have been observed leveraging fake artificial intelligence (AI)-powered tools as a lure to...
Google has agreed to pay the U.S. state of Texas nearly $1.4 billion to settle...
Germany’s Federal Criminal Police Office (aka Bundeskriminalamt or BKA) has seized the online infrastructure and...
A joint law enforcement operation undertaken by Dutch and U.S. authorities has dismantled a criminal...
The North Korean threat actors behind the Contagious Interview campaign have been observed using updated...
Cybersecurity researchers are warning of a new campaign that’s targeting Portuguese-speaking users in Brazil with...
AI agents are changing the way businesses work. They can answer questions, automate tasks, and...
Cybersecurity researchers have flagged three malicious npm packages that are designed to target the Apple...
The Vulnerability Treadmill The reactive nature of vulnerability management, combined with delays from policy and...
Google on Thursday announced it’s rolling out new artificial intelligence (AI)-powered countermeasures to combat scams...
A China-linked unnamed threat actor dubbed Chaya_004 has been observed exploiting a recently disclosed security...
Cybersecurity researchers have exposed what they say is an “industrial-scale, global cryptocurrency phishing operation” engineered...
61% of security leaders reported suffering a breach due to failed or misconfigured controls over...
SonicWall has released patches to address three security flaws affecting SMA 100 Secure Mobile Access...
Threat actors with ties to the Qilin ransomware family have leveraged malware known as SmokeLoader...
Guidance for enterprise administrators who want to reduce the likelihood of being held to ransom...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.