Cybersecurity researchers have disclosed details of a telecommunications fraud campaign that uses fake CAPTCHA verification...
Cybersecurity researchers have discovered a new Lua-based malware created years before the notorious Stuxnet worm...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added four vulnerabilities impacting SimpleHelp,...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has revealed that an unnamed federal civilian...
The Office of Inspector General (OIG) of the U.S. National Aeronautics and Space Administration (NASA)...
The AI Agent Authority Gap – From Ungoverned to Delegation As discussed in our previous...
Cybersecurity researchers have discovered a set of malicious apps on the Apple App Store that...
Chinese-speaking individuals are the target of a new campaign that uses a trojanized version of...
A high-severity security flaw in LMDeploy, an open-source toolkit for compressing, deploying, and serving LLMs,...
A previously undocumented threat activity cluster known as UNC6692 has been observed leveraging social engineering...
Bitwarden CLI has been compromised as part of the newly discovered and ongoing Checkmarx supply...
You scroll past one incident and see another that feels familiar, like it should have...
Imagine a world where hackers don’t sleep, don’t take breaks, and find weak spots in...
Passkeys and other FIDO2 credentials offer a more usable, secure replacement for passwords and are...
Passkeys are the more secure and user-friendly login method and should be the default authentication...
Explaining the widespread shift in tactics, techniques and procedures (TTPs) towards networks of compromised infrastructure,...
Organisations should map and baseline their edge device traffic, especially VPN and remote access connections,...
New advisory highlights how to defend against attacker tactics believed to be used by China-linked...
Adopting AI will require time, the development of new capabilities and careful oversight. ...
Last week, Anthropic announced Project Glasswing, an AI model so effective at discovering software vulnerabilities...
Mongolian governmental institutions have emerged as the target of a previously undocumented China-aligned advanced persistent...
Vercel on Wednesday revealed that it has identified an additional set of customer accounts that...
Apple has rolled out a software fix for iOS and iPadOS to address a Notification...
Cybersecurity researchers have warned of malicious images pushed to the official “checkmarx/kics” Docker Hub repository....
Cybersecurity researchers have flagged a fresh set of packages that have been compromised by bad...
The threat actor known as Harvester has been attributed to a new Linux version of...
SilentGlass, a plug-and-play device, actively blocks any unexpected or malicious HDMI and Display Port connections....
Cybersecurity researchers have discovered a previously undocumented data wiper that has been used in attacks...
On January 31, 2026, researchers disclosed that Moltbook, a social network built for AI agents,...
Microsoft has released out-of-band updates to address a security vulnerability in ASP.NET Core that could...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.