An Iran-nexus cyber espionage group known as UNC1549 has been attributed to a new campaign...
A proxy network known as REM Proxy is powered by malware known as SystemBC, offering...
Fortra has disclosed details of a critical security flaw in GoAnywhere Managed File Transfer (MFT)...
The phishing-as-a-service (PhaaS) offering known as Lighthouse and Lucid has been linked to more than...
Run by the team at workflow orchestration and AI platform Tines, the Tines library features...
Cybersecurity researchers have discerned evidence of two Russian hacking groups Gamaredon and Turla collaborating together...
Law enforcement authorities in the U.K. have arrested two teen members of the Scattered Spider...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday released details of two sets...
SonicWall is urging customers to reset credentials after their firewall configuration backup files were exposed...
Cybersecurity researchers have discovered a new malware loader codenamed CountLoader that has been put to...
Cybersecurity researchers have discovered two new malicious packages in the Python Package Index (PyPI) repository...
AI’s growing role in enterprise environments has heightened the urgency for Chief Information Security Officers...
Google on Wednesday released security updates for the Chrome web browser to address four vulnerabilities,...
The threat actor known as TA558 has been attributed to a fresh set of attacks...
How to choose an external attack surface management (EASM) tool that’s right for your organisation....
A guide to choosing the right EASM product for your organisation, and the security features...
A China-aligned threat actor known as TA415 has been attributed to spear-phishing campaigns targeting the...
Quantum computing and AI working together will bring incredible opportunities. Together, the technologies will help...
Generative AI has gone from a curiosity to a cornerstone of enterprise productivity in just...
Cybersecurity researchers have tied a fresh round of cyber attacks targeting financial services to the...
The U.S. Department of Justice (DoJ) on Tuesday resentenced the former administrator of BreachForums to...
Microsoft’s Digital Crimes Unit said it teamed up with Cloudflare to coordinate the seizure of...
Cybersecurity researchers have disclosed multiple critical security vulnerabilities in Chaos Mesh that, if successfully exploited,...
A massive ad fraud and click fraud operation dubbed SlopAds ran a cluster of 224...
Cybersecurity researchers have warned of a new campaign that’s leveraging a variant of the FileFix...
Apple on Monday backported fixes for a recently patched security flaw that has been actively...
AI agents are rapidly becoming a core part of the enterprise, being embedded across enterprise...
A team of academics from ETH Zürich and Google has discovered a new variant of...
Cybersecurity researchers have flagged a fresh software supply chain attack targeting the npm registry that...
The China-aligned threat actor known as Mustang Panda has been observed using an updated version...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.