Google on Monday said it’s officially rolling out Android developer verification to all developers to...
A high-severity security flaw in the TrueConf client video conferencing software has been exploited in...
Cybersecurity researchers have disclosed a security “blind spot” in Google Cloud’s Vertex AI platform that...
The NCSC has issued actions for individuals at risk of targeted attacks against messaging apps....
Chinese-speaking users are the target of an active campaign that uses typosquatted domains impersonating trusted...
The cybersecurity landscape is accelerating at an unprecedented rate. What is emerging is not simply...
The popular HTTP client known as Axios has suffered a supply chain attack after two...
A previously unknown vulnerability in OpenAI ChatGPT allowed sensitive conversation data to be exfiltrated without...
A new campaign has leveraged the ClickFix social engineering tactic as a way to distribute...
Some weeks are loud. This one was quieter but not in a good way. Long-running...
What is really slowing Tier 1 down: the threat itself or the process around it?...
The NCSC is encouraging UK organisations to mitigate an unauthenticated remote code execution vulnerability affecting...
Understanding the threats and staying ahead of the adversary...
Secrets sprawl isn’t slowing down: in 2025, it accelerated faster than most security teams anticipated....
Cybersecurity researchers have discovered a remote access toolkit of Russian-origin that’s distributed via malicious Windows...
Three threat activity clusters aligned with China have targeted a government organization in Southeast Asia...
Threat actors with ties to Iran successfully broke into the personal email account of Kash...
A recently disclosed critical security flaw impacting Citrix NetScaler ADC and NetScaler Gateway is witnessing...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw...
Proofpoint has disclosed details of a targeted email campaign in which threat actors with ties...
Apple is now sending Lock Screen notifications to iPhones and iPads running older versions of...
TeamPCP, the threat actor behind the supply chain attack targeting Trivy, KICS, and litellm, has...
Cybersecurity researchers have disclosed details of a now-patched bug impacting Open VSX’s pre-publish scanning pipeline...
Threat actors are using adversary-in-the-middle (AitM) phishing pages to seize control of TikTok for Business...
Rising geopolitical tensions are reflected (or in some cases preceded) by cyber operations, while technology...
A pro-Ukrainian group called Bearlyfy has been attributed to more than 70 cyber attacks targeting...
Cybersecurity researchers have disclosed three security vulnerabilities impacting LangChain and LangGraph that, if successfully exploited,...
A long-term and ongoing campaign attributed to a China-nexus threat actor has embedded itself in...
Cybersecurity researchers have disclosed a vulnerability in Anthropic’s Claude Google Chrome Extension that could have...
Unmasking impostors is something the art world has faced for decades, and there are valuable...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.