admin
September 29, 2023
Most people are barely thinking about basic cybersecurity, let alone post-quantum cryptography. But the impact of a...
admin
September 29, 2023
Malicious ads served inside Microsoft Bing's artificial intelligence (AI) chatbot are being used to distribute malware when...
admin
September 29, 2023
Progress Software has released hotfixes for a critical security vulnerability, alongside seven other flaws, in the WS_FTP...
admin
September 29, 2023
Cisco is warning of attempted exploitation of a security flaw in its IOS Software and IOS XE...
GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot Contributions

2 min read
admin
September 28, 2023
A new malicious campaign has been observed hijacking GitHub accounts and committing malicious code disguised as Dependabot...
admin
September 28, 2023
Cybersecurity agencies from Japan and the U.S. have warned of attacks mounted by a state-backed hacking group...
The Dark Side of Browser Isolation – and the Next Generation Browser Security Technologies

3 min read
admin
September 28, 2023
The landscape of browser security has undergone significant changes over the past decade. While Browser Isolation was...
admin
September 28, 2023
Government and telecom entities have been subjected to a new wave of attacks by a China-linked threat...
admin
September 28, 2023
Google on Wednesday rolled out fixes to address a new actively exploited zero-day in the Chrome browser.
Tracked...
admin
September 27, 2023
A new threat actor known as AtlasCross has been observed leveraging Red Cross-themed phishing lures to deliver two previously...
admin
September 27, 2023
A novel side-channel attack called GPU.zip renders virtually all modern graphics processing units (GPU) vulnerable to information leakage.
"This channel...
admin
September 27, 2023
Google has assigned a new CVE identifier for a critical security flaw in the libwebp image library...
admin
September 27, 2023
Data security is in the headlines often, and it’s almost never for a positive reason. Major breaches,...
admin
September 27, 2023
A new malware strain called ZenRAT has emerged in the wild that's distributed via bogus installation packages...
admin
September 26, 2023
SOC 2, ISO, HIPAA, Cyber Essentials – all the security frameworks and certifications today are an acronym...
admin
September 26, 2023
An updated version of an Android banking trojan called Xenomorph has set its sights on more than 35 financial institutions in...
admin
September 26, 2023
Microsoft is officially rolling out support for passkeys in Windows 11 today as part of a major update to...
admin
September 26, 2023
Cybersecurity experts have shed light on a new cybercrime group known as ShadowSyndicate (formerly Infra Storm) that may have...
Critical JetBrains TeamCity Flaw Could Expose Source Code and Build Pipelines to Attackers

2 min read
admin
September 26, 2023
A critical security vulnerability in the JetBrains TeamCity continuous integration and continuous deployment (CI/CD) software could be...
Threat Report: The High Tech Industry Targeted the Most with 46% of NLX-Tagged Attack Traffic

8 min read
admin
September 26, 2023
How To Use This Report
Enhance situational awareness of techniques used by threat actors
Identify potential attacks targeting your...