The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV)...
Cybersecurity researchers have discovered vulnerable code in legacy Python packages that could potentially pave the...
The North Korean threat actors behind the Contagious Interview campaign have continued to flood the...
As IT environments become increasingly distributed and organizations adopt hybrid and remote work at scale,...
Cybersecurity researchers have shed light on a cross-tenant blind spot that allows attackers to bypass...
The threat actor known as Bloody Wolf has been attributed to a cyber attack campaign...
The NCSC’s Cyber Action Toolkit helps you to protect your business from online attacks....
Microsoft has announced plans to improve the security of Entra ID authentication by blocking unauthorized...
Hackers have been busy again this week. From fake voice calls and AI-powered malware to...
Why transferring the Commercial Product Assurance scheme to industry ownership marks an important milestone....
Gainsight has disclosed that the recent suspicious activity targeting its applications has affected more customers...
The second wave of the Shai-Hulud supply chain attack has spilled over to the Maven...
South Korea’s financial sector has been targeted by what has been described as a sophisticated...
Enterprises today are expected to have at least 6-8 detection tools, as detection is considered...
Cybersecurity researchers have discovered a new malicious extension on the Chrome Web Store that’s capable...
If you’re using community tools like Chocolatey or Winget to keep systems updated, you’re not...
The threat actors behind a malware family known as RomCom targeted a U.S.-based civil engineering...
The U.S. Federal Bureau of Investigation (FBI) has warned that cybercriminals are impersonating financial institutions...
New research has found that organizations in various sensitive sectors, including governments, telecoms, and critical...
Cybersecurity researchers are calling attention to a new campaign that’s leveraging a combination of ClickFix...
The threat actor known as ToddyCat has been observed adopting new methods to obtain access...
2026 will mark a pivotal shift in cybersecurity. Threat actors are moving from experimenting with...
Cybersecurity researchers have disclosed details of a new campaign that has leveraged Blender Foundation files...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday issued an alert warning of...
Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight telemetry agent,...
Multiple security vendors are sounding the alarm about a second wave of attacks targeting the...
This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with...
New research from CrowdStrike has revealed that DeepSeek’s artificial intelligence (AI) reasoning model DeepSeek-R1 produces...
An SME’s guide to selecting and working with managed service providers....
A recently patched security flaw in Microsoft Windows Server Update Services (WSUS) has been exploited...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.