The personal information for 30,000 employees have been shared on a hacking forum...
A 46-year-old man in the U.S. has been sentenced to 25 years in prison after...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a new Binding Operational Directive...
Nicknamed ProxyNotShell, a new exploit used in the wild takes advantage of the recently published...
1 Comment
Australian telecom giant Optus on Monday confirmed that nearly 2.1 million of its current and...
A threat actor likely with associations to China has been attributed to a new supply...
The recently discovered Linux-Based ransomware strain known as Cheerscrypt has been attributed to a Chinese...
The North Korea-backed Lazarus Group has been observed deploying a Windows rootkit by taking advantage...
A former U.S. National Security Agency (NSA) employee has been arrested on charges of attempting...
Whether you relish a mental challenge or fancy a six-figure paycheck, there are many good...
Microsoft on Friday disclosed that a single activity group in August 2022 achieved initial access...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed critical flaw impacting...
Threat actors have been found deploying never-before-seen post-compromise implants in VMware’s virtualization software to seize...
An espionage-focused threat actor has been observed using a steganographic trick to conceal a previously...
A social engineering campaign leveraging job-themed lures is weaponizing a years-old remote code execution flaw...
Endpoint devices like desktops, laptops, and mobile phones enable users to connect to enterprise networks...
A “highly operational, destructive, and sophisticated nation-state activity group” with ties to North Korea has...
Microsoft officially disclosed it investigating two zero-day security vulnerabilities impacting Exchange Server 2013, 2016, and...
Security researchers are warning of previously undisclosed flaws in fully patched Microsoft Exchange servers being...
The NCSC’s threat report is drawn from recent open source reporting....
A full timeline of the Optus data breach and the events that followed it...
A Brazilian threat actor known as Prilex has resurfaced after a year-long operational hiatus with an advanced...
A new covert attack campaign singled out multiple military and weapons contractor companies with spear-phishing...
Every year, billions of credentials appear online, be it on the dark web, clear web,...
A threat actor by the name of LeakBase has shared a database containing personal information...
Several hacktivist groups are using Telegram and other tools to aid anti-government protests in Iran...
A new, multi-functional Go-based malware dubbed Chaos has been rapidly growing in volume in recent months to...
A recently discovered malware builder called Quantum Builder is being used to deliver the Agent...
Organizations struggle to find ways to keep a good security posture. This is because it...
The Russian state-sponsored threat actor known as APT28 has been found leveraging a new code execution method...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.