The threat actors behind the VexTrio Viper Traffic Distribution Service (TDS) have been linked to...
Cybersecurity researchers have discovered a novel attack technique called TokenBreak that can be used to...
AI is changing everything — from how we code, to how we sell, to how...
A novel attack technique named EchoLeak has been characterized as a “zero-click” artificial intelligence (AI)...
Human identities management and control is pretty well done with its set of dedicated tools,...
ConnectWise has disclosed that it’s planning to rotate the digital code signing certificates used to...
Cybersecurity researchers have uncovered a new account takeover (ATO) campaign that leverages an open-source penetration...
Former members tied to the Black Basta ransomware operation have been observed sticking to their...
Threat intelligence firm GreyNoise has warned of a “coordinated brute-force activity” targeting Apache Tomcat Manager...
The examples use off-the-shelf commercial technologies, giving organizations valuable starting points....
INTERPOL on Wednesday announced the dismantling of more than 20,000 malicious IP addresses or domains...
In today’s cybersecurity landscape, much of the focus is placed on firewalls, antivirus software, and...
Two security vulnerabilities have been disclosed in SinoTrack GPS devices that could be exploited to...
In today’s security landscape, budgets are tight, attack surfaces are sprawling, and new threats emerge...
Microsoft has released patches to fix 67 security flaws, including one zero-day bug in Web...
Adobe on Tuesday pushed security updates to address a total of 254 security flaws impacting...
Cybersecurity researchers have uncovered over 20 configuration-related risks affecting Salesforce Industry Cloud (aka Salesforce Industries),...
The financially motivated threat actor known as FIN6 has been observed leveraging fake resumes hosted...
Cybersecurity researchers have shed light on a previously undocumented Rust-based information stealer called Myth Stealer...
School’s out, the sun is shining—and kids are spending more time online than ever. Whether...
Modern enterprise networks are highly complex environments that rely on hundreds of apps and infrastructure...
Google has stepped in to address a security flaw that could have made it possible...
The threat actor known as Rare Werewolf (formerly Rare Wolf) has been linked to a...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two critical security flaws...
The reconnaissance activity targeting American cybersecurity company SentinelOne was part of a broader set of...
A now-patched critical security flaw in the Wazur Server is being exploited by threat actors...
Behind every security alert is a bigger story. Sometimes it’s a system being tested. Sometimes...
You don’t need a rogue employee to suffer a breach. All it takes is a...
OpenAI has revealed that it banned a set of ChatGPT accounts that were likely operated...
Cybersecurity researchers have flagged a supply chain attack targeting over a dozen packages associated with...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.