A Farsi-speaking threat actor aligned with Iranian state interests is suspected to be behind a...
Google-owned Mandiant on Friday said it identified an “expansion in threat activity” that uses tradecraft...
CERT Polska, the Polish computer emergency response team, revealed that coordinated cyber attacks targeted more...
Cybersecurity researchers have discovered malicious Google Chrome extensions that come with capabilities to hijack affiliate...
Cybersecurity researchers have discovered a new campaign attributed to a China-linked threat actor known as...
Behind the scenes of law enforcement in cyber: what do we know about caught cybercriminals?...
A former Google engineer accused of stealing thousands of the company’s confidential documents to build...
SmarterTools has addressed two more security flaws in SmarterMail email software, including one critical security...
Ivanti has rolled out security updates to address two security flaws impacting Ivanti Endpoint Manager...
A new joint investigation by SentinelOne SentinelLABS, and Censys has revealed that the open-source artificial...
This week’s updates show how small changes can create real problems. Not loud incidents, but...
A study by OMICRON has revealed widespread cybersecurity gaps in the operational technology (OT) networks...
Beyond the direct impact of cyberattacks, enterprises suffer from a secondary but potentially even more...
SolarWinds has released security updates to address multiple security vulnerabilities impacting SolarWinds Web Help Desk,...
CRTFs are helping organisations to make informed, risk-based decisions on the adoption of technology products....
Google on Wednesday announced that it worked together with other partners to disrupt IPIDEA, which...
Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS Code) extension for...
The “coordinated” cyber attack targeting multiple sites across the Polish power grid has been attributed...
A critical sandbox escape vulnerability has been disclosed in the popular vm2 Node.js library that,...
Cybersecurity researchers have disclosed two new security flaws in the n8n workflow automation platform, including...
If you work in security operations, the concept of the AI SOC agent is likely...
Threat actors with ties to China have been observed using an updated version of a...
When security teams discuss credential-related risk, the focus typically falls on threats such as phishing,...
Google on Tuesday revealed that multiple threat actors, including nation-state adversaries and financially motivated groups,...
Cybersecurity researchers have discovered two malicious packages in the Python Package Index (PyPI) repository that...
Fortinet has begun releasing security updates to address a critical flaw impacting FortiOS that has...
Meta on Tuesday announced it’s adding Strict Account Settings on WhatsApp to secure certain users...
Indian government entities have been targeted in two campaigns undertaken by a threat actor that...
Cybersecurity researchers have disclosed details of a new campaign that combines ClickFix-style fake CAPTCHAs with...
Cybersecurity teams increasingly want to move beyond looking at threats and vulnerabilities in isolation. It’s...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.