In a world where threats are persistent, the modern CISO’s real job isn’t just to...
A new artificial intelligence (AI)-powered penetration testing tool linked to a China-based company has attracted...
Chinese-speaking users are the target of a search engine optimization (SEO) poisoning campaign that uses...
The U.S. Federal Bureau of Investigation (FBI) has issued a flash alert to release indicators...
Samsung has released its monthly security updates for Android, including a fix for a security...
Apple has notified users in France of a spyware campaign targeting their devices, according to...
Cybersecurity researchers have discovered a new ransomware strain dubbed HybridPetya that resembles the notorious Petya/NotPetya...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw...
The security landscape for cloud-native applications is undergoing a profound transformation. Containers, Kubernetes, and serverless...
A security weakness has been disclosed in the artificial intelligence (AI)-powered code editor Cursor that...
Google on Tuesday announced that its new Google Pixel 10 phones support the Coalition for...
U.S. Senator Ron Wyden has called on the Federal Trade Commission (FTC) to probe Microsoft...
Threat actors affiliated with the Akira ransomware group have continued to target SonicWall devices for...
Cybersecurity researchers have disclosed two new campaigns that are serving fake browser extensions using malicious...
CISOs know their field. They understand the threat landscape. They understand how to build a...
Cybersecurity researchers have disclosed details of a new campaign that leverages ConnectWise ScreenConnect, a legitimate...
An advanced persistent threat (APT) group from China has been attributed to the compromise of...
Cybersecurity researchers have discovered two new malware families, including a modular Apple macOS backdoor called...
Microsoft on Tuesday addressed a set of 80 security flaws in its software, including one...
Apple on Tuesday revealed a new security feature called Memory Integrity Enforcement (MIE) that’s built...
The House Select Committee on China has formally issued an advisory warning of an “ongoing”...
Introduction Managed service providers (MSPs) and managed security service providers (MSSPs) are under increasing pressure...
Phishing-as-a-Service (PhaaS) platforms keep evolving, giving attackers faster and cheaper ways to break into corporate...
Adobe has warned of a critical security flaw in its Commerce and Magento Open Source...
SAP on Tuesday released security updates to address multiple security flaws, including three critical vulnerabilities...
Why planning and rehearsing your recovery from an incident is as vital as building your...
Threat actors are abusing HTTP client tools like Axios in conjunction with Microsoft’s Direct Send...
A new Android malware called RatOn evolved from a basic tool capable of conducting Near...
Cybersecurity researchers have disclosed details of a phishing campaign that delivers a stealthy banking malware-turned-remote...
Cybersecurity researchers have discovered a variant of a recently disclosed campaign that abuses the TOR...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.