As 2022 comes to an end, now’s the time to level up your bug bounty...
The cyber espionage group known as Bahamut has been attributed as behind a highly targeted...
The Android banking fraud malware known as SharkBot has reared its head once again on...
1 Comment
Companies based in the U.S. have been at the receiving end of an “aggressive” Qakbot...
As many as 34 Russian-speaking gangs distributing information-stealing malware under the stealer-as-a-service model stole no...
The operators of the Ducktail information stealer have demonstrated a “relentless willingness to persist” and...
Delivering a superior customer experience is essential for any e-commerce business. For those companies, there’s...
Microsoft on Tuesday disclosed the intrusion activity aimed at Indian power grid entities earlier this...
Meta Platforms on Tuesday said it took down a network of accounts and pages across...
A nascent and legitimate penetration testing framework known as Nighthawk is likely to gain threat...
A malicious extension for Chromium-based web browsers has been observed to be distributed via a...
How to shop safely online....
Former employees allegedly took advantage of a system that resets user accounts in exchange for...
A nascent Go-based malware known as Aurora Stealer is being increasingly deployed as part of...
The best line of defense against holiday hacking schemes is a comprehensive incident response strategy that focuses...
The Luna Moth campaign has extorted hundreds of thousands of dollars from several victims in...
How to erase the personal data from your phone, tablets, and other devices (and why...
The U.S. Justice Department (DoJ) on Monday announced the takedown of seven domain names in connection to...
The cybercrime group called Daixin Team has leaked sample data belonging to AirAsia, a Malaysian...
The notorious Emotet malware has returned with renewed vigor as part of a high-volume malspam...
[Want Bob to stop complaining? Change your practices.] [Don’t delay change – it can cost...
Google has won a lawsuit filed against two Russian nationals in connection with the operation...
Google Cloud last week disclosed that it identified 34 different hacked release versions of the...
The Indian government on Friday released a draft version of the much-awaited data protection regulation,...
A developing threat activity cluster has been found using Google Ads in one of its...
A notorious advanced persistent threat actor known as Mustang Panda has been linked to a spate of...
Australian software company Atlassian has rolled out security updates to address two critical flaws affecting Bitbucket Server,...
Meta Platforms is said to have fired or disciplined over two dozen employees and contractors...
The LodaRAT malware has resurfaced with new variants that are being deployed in conjunction with...
Threat hunting is the process of looking for malicious activity and its artifacts in a...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.