The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) has imposed sanctions against a...
Cybersecurity researchers have disclosed three security flaws in Planet Technology’s WGS-804HPT industrial switches that could...
Cybersecurity researchers have exposed a new campaign that targets web servers running PHP-based applications to...
Recent data breaches have highlighted the critical need to improve guest Wi-Fi infrastructure security in...
Cybersecurity researchers have detailed a new adversary-in-the-middle (AitM) phishing kit that’s capable of Microsoft 365...
The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) sanctioned two individuals and four...
Austrian privacy non-profit None of Your Business (noyb) has filed complaints accusing companies like TikTok,...
The Russian threat actor known as Star Blizzard has been linked to a new spear-phishing...
The digital world is exploding. IoT devices are multiplying like rabbits, certificates are piling up...
You can tell the story of the current state of stolen credential-based attacks in three...
Details have emerged about a now-patched security vulnerability that could allow a bypass of the...
Cybersecurity researchers have found that the Microsoft Active Directory Group Policy that’s designed to disable...
Threat actors have been observed concealing malicious code in images to deliver malware such as...
Cybersecurity researchers have detailed an attack that involved a threat actor utilizing a Python-based backdoor...
Ivanti has rolled out security updates to address several security flaws impacting Avalanche, Application Control...
Speakers: Karen Wetzel NICE Framework Manager NICE Additional speakers to be announced. Synopsis: When the...
Cybersecurity researchers have alerted to a new malvertising campaign that’s targeting individuals and businesses advertising...
The North Korea-linked Lazarus Group has been attributed to a new cyber attack campaign dubbed...
Cybersecurity researchers have identified infrastructure links between the North Korean threat actors behind the fraudulent...
As many as six security vulnerabilities have been disclosed in the popular Rsync file-synchronizing tool...
Why does ICS/OT need specific controls and its own cybersecurity budget today? Because treating ICS/OT...
The U.S. Department of Justice (DoJ) on Tuesday disclosed that a court-authorized operation allowed the...
Microsoft kicked off 2025 with a new set of patches for a total of 161...
Cybersecurity researchers have disclosed multiple security flaws in SimpleHelp remote access software that could lead...
Microsoft has shed light on a now-patched security flaw impacting Apple macOS that, if successfully...
New research has pulled back the curtain on a “deficiency” in Google’s “Sign in with...
Passkeys are the future of authentication, offering enhanced security and convenience over passwords, but widespread...
The merits of choosing passkeys over passwords to help keep your online accounts more secure,...
What do identity risks, data security risks and third-party risks all have in common? They...
The Telegram-based online marketplace known as HuiOne Guarantee and its vendors have cumulatively received at...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.