Apple on Wednesday released iOS, iPadOS, macOS Tahoe, tvOS, watchOS, and visionOS updates to address...
Cybersecurity researchers have discovered what they said is the first known malicious Microsoft Outlook add-in...
Indian defense sector and government-aligned organizations have been targeted by multiple campaigns that are designed...
It’s Patch Tuesday, which means a number of software vendors have released patches for various...
Intentionally vulnerable training applications are widely used for security education, internal testing, and product demonstrations....
Microsoft on Tuesday released security updates to address a set of 59 flaws across its...
Cybersecurity researchers have disclosed details of a new botnet operation called SSHStalker that relies on...
The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector...
The information technology (IT) workers associated with the Democratic People’s Republic of Korea (DPRK) are...
Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded...
Are ransomware and encryption still the defining signals of modern cyberattacks, or has the industry...
January 5, 2026, Seattle, USA — ZAST.AI announced the completion of a $6 million Pre-A...
SmarterTools confirmed last week that the Warlock (aka Storm-2603) ransomware gang breached its network by...
The Netherlands’ Dutch Data Protection Authority (AP) and the Council for the Judiciary confirmed both...
Fortinet has released security updates to address a critical flaw impacting FortiClientEMS that could lead...
How to ensure the ‘organisational memory’ of past vulnerabilities is not lost....
The Cyber Security Agency (CSA) of Singapore on Monday revealed that the China-nexus cyber espionage...
Microsoft has revealed that it observed a multi‑stage intrusion that involved the threat actors exploiting...
Cyber threats are no longer coming from just malware or exploits. They’re showing up inside...
Why do SOC teams keep burning out and missing SLAs even after spending big on...
The threat actor known as Bloody Wolf has been linked to a campaign targeting Uzbekistan...
Cybersecurity researchers have called attention to a “massive campaign” that has systematically targeted cloud native...
BeyondTrust has released updates to address a critical security flaw impacting Remote Support (RS) and...
OpenClaw (formerly Moltbot and Clawdbot) has announced that it’s partnering with Google-owned VirusTotal to scan...
Germany’s Federal Office for the Protection of the Constitution (aka Bundesamt für Verfassungsschutz or BfV)...
Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian Executive Branch (FCEB)...
A previously undocumented cyber espionage group operating from Asia broke into the networks of at...
Organisations with experience in external attack surface management can help us shape future ACD 2.0...
As you know, enterprise network security has undergone significant evolution over the past decade. Firewalls...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.