As many as three disparate but related campaigns between March and Jun 2022 have been...
As threat complexity increases and the boundaries of an organization have all but disappeared, security...
Akasa Air, India’s newest commercial airline, exposed the personal data belonging to its customers that...
The U.S. Federal Bureau of Investigation (FBI) on Monday warned of cyber criminals increasingly exploiting...
The U.S. Federal Trade Commission (FTC) on Monday said it filed a lawsuit against Kochava,...
By exploiting cloud services, organisations no longer have to choose between ‘more security’ and ‘better...
A new ransomware strain written in Golang dubbed “Agenda” has been spotted in the wild,...
A Turkish-speaking entity called Nitrokod has been attributed to an active cryptocurrency mining campaign that...
If you’re heading out of the office on a well-deserved vacation, are you certain the...
Twilio, which earlier this month became a sophisticated phishing attack, disclosed last week that the threat...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added 10 new actively exploited...
Iranian state-sponsored actors are leaving no stone unturned to exploit unpatched systems running Log4j to...
Atlassian has rolled out fixes for a critical security flaw in Bitbucket Server and Data Center that...
Password management service LastPass confirmed a security incident that resulted in the theft of certain...
Nation-state threat actors are increasingly adopting and integrating the Sliver command-and-control (C2) framework in their intrusion campaigns...
New guidance for businesses of all sizes planning to take part in Joint Ventures....
The NCSC’s threat report is drawn from recent open source reporting....
NIST has begun the process to update the NIST Cybersecurity Framework to keep pace with...
What comes to mind when you hear the word interrogation? Perhaps, the typical movie scene...
Hackers directly targeted Twilio employees with a phishing attack to gain unauthorized access to employee...
To reduce data breaches from cloud services, seek out providers who ensure functionality is ‘secure...
Human beings are social animals. We like to stay connected with friends, family and even...
Unparalleled access to skilled users transformed Rebellion Defence’s product roadmap....
The National Cybersecurity Center of Excellence (NCCoE) has released a new draft project description, Software...
Revised draft publication aims to help organizations comply with HIPAA Security Rule....
NIST is posting two draft Special Publications (SP) on the Enterprise Impact of Information and...
The initial public draft of NIST Special Publication (SP) 800-66r2 (Revision 2), Implementing the Health...
The presentation slides are available here. Download the Continuing Education Units form. Speakers: Danielle Santos...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.