With each passing year, the cybersecurity threat landscape continues to worsen. That reality makes cybersecurity...
Web infrastructure and security company Cloudflare disclosed this week that it halted a 2.5 Tbps...
A proof-of-concept (PoC) exploit code has been made available for the recently disclosed critical security...
The NCSC’s threat report is drawn from recent open source reporting....
A previously undocumented command-and-control (C2) framework dubbed Alchimist is likely being used in the wild...
A novel timing attack discovered against the npm’s registry API can be exploited to potentially...
NIST Special Publication (SP) 800-220, 2021 Cybersecurity and Privacy Program Annual Report, was recently published—which...
What is the OWASP Top 10, and – just as important – what is it...
Toyota source code was posted on GitHub, allowing unauthorized access to over 296,000 customer’s details...
An advanced persistent threat (APT) actor known as Budworm targeted a U.S.-based entity for the first time...
An unofficial version of the popular WhatsApp messaging app called YoWhatsApp has been observed deploying...
A threat actor tracked as Polonium has been linked to over a dozen highly targeted...
Anne W takes stock of where we are following the changes to Cyber Essentials in...
Malicious actors are resorting to voice phishing (vishing) tactics to dupe victims into installing Android...
As software supply chain security becomes more and more crucial, security, DevSecOps, and DevOps teams...
Google on Wednesday officially rolled out support for passkeys, the next-generation authentication standard, to both...
In April 2022, Omnicell reported a data breach affecting nearly 62,000 patients. The company has...
A vulnerability in Siemens Simatic programmable logic controller (PLC) can be exploited to retrieve the...
The free release contains credit card numbers, along with personal details of credit card holders...
Microsoft’s Patch Tuesday update for the month of October has addressed a total of 85 security...
Guidance describes practical steps to help organisations assess cyber security in their supply chains....
The operators behind the BazaCall call back phishing method have continued to evolve with updated...
A now-patched security flaw in the vm2 JavaScript sandbox module could be abused by a...
The White House has recently announced a $1 billion cyber security grant program that is...
Cyber criminals are using a previously undocumented phishing-as-a-service (PhaaS) toolkit called Caffeine to effectively scale up their...
Fortinet on Monday revealed that the newly patched critical security vulnerability impacting its firewall and...
A new piece of research has detailed the increasingly sophisticated nature of the malware toolset...
Threat actors associated with the notorious Emotet malware are continually shifting their tactics and command-and-control...
Chipmaker Intel has confirmed that proprietary source code related to its Alder Lake CPUs has...
BNB Chain, a blockchain linked to the Binance cryptocurrency exchange, disclosed an exploit on a...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.