Cisco has released a new security advisory warning of a high-severity flaw affecting IP Phone...
Businesses know they need cybersecurity, but it seems like a new acronym and system is...
Cybersecurity researchers have reported an increase in TrueBot infections, primarily targeting Mexico, Brazil, Pakistan, and the U.S....
API attacks are on the rise. One of their major targets is eCommerce firms like...
The subgroup of an Iranian nation-state group known as Nemesis Kitten has been attributed as behind a...
For today’s businesses data privacy is already a big headache, and with modern privacy laws...
The Iran-linked MuddyWater threat actor has been observed targeting several countries in the Middle East as well...
Nick B explains how a new code of practice will protect consumers from malicious actors...
The NCSC’s threat report is drawn from recent open source reporting....
Researchers have shed light on a new hybrid malware campaign targeting both Android and Windows...
1 Comment
Malicious actors have been posing as the band in an attempt to defraud fans by...
NIST is seeking public comments on two draft NIST Internal Reports (NIST IR) for the...
An unconventional data exfiltration method leverages a previously undocumented covert channel to leak sensitive information...
Apple on Wednesday announced a raft of security measures, including an Advanced Data Protection setting that enables...
Looking to up your cybersecurity game in the new year? Do not just buy electronics...
An Internet Explorer zero-day vulnerability was actively exploited by a North Korean threat actor to...
An Iranian advanced persistent threat (APT) actor known as Agrius has been attributed as behind a set...
Access to clean water is critical to public health, the environment, and our nation’s economic...
The Vice Society cybercrime group has disproportionately targeted educational institutions, accounting for 33 victims in...
Critical infrastructure is important for societal existence, growth, and development. Societies are reliant on the...
Many people assume that as professional social engineers (SE) we use EVERY method possible to...
The China-linked nation-state hacking group referred to as Mustang Panda is using lures related to the ongoing...
A state-sponsored hacking group with links to Russia has been linked to attack infrastructure that...
The cyber attack has compromised access to several government systems...
Cryptocurrency investment companies are the target of a developing threat cluster that uses Telegram groups...
A novel Go-based botnet called Zerobot has been observed in the wild proliferating by taking advantage of...
A malicious campaign targeting the Middle East is likely linked to BackdoorDiplomacy, an advanced persistent threat...
Hackers with ties to the Iranian government have been linked to an ongoing social engineering...
Cybersecurity researchers have shed light on a darknet marketplace called InTheBox that’s designed to specifically cater to...
Ransomware attacks keep increasing in volume and impact largely due to organizations’ weak security controls....
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.