admin
December 10, 2024
Users of Cleo-managed file transfer software are being urged to ensure that their instances are not exposed...
admin
December 10, 2024
Cybersecurity researchers have shed light on a sophisticated mobile phishing (aka mishing) campaign that's designed to distribute...
admin
December 10, 2024
Belgian and Dutch authorities have arrested eight suspects in connection with a "phone phishing" gang that primarily...
admin
December 10, 2024
A suspected China-nexus cyber espionage group has been attributed to an attacks targeting large business-to-business IT service...
admin
December 10, 2024
Cyber attackers never stop inventing new ways to compromise their targets. That's why organizations must stay updated...
admin
December 10, 2024
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new set of cyber attacks...
admin
December 10, 2024
The threat actors linked to the Black Basta ransomware have been observed switching up their social engineering...
admin
December 9, 2024
Details have emerged about a now-patched security flaw in the DeepSeek artificial intelligence (AI) chatbot that, if...
admin
December 9, 2024
Identity security is all the rage right now, and rightfully so. Securing identities that access an organization’s...
admin
December 9, 2024
A malicious botnet called Socks5Systemz is powering a proxy service called PROXY.AM, according to new findings from...
admin
December 9, 2024
This week’s cyber world is like a big spy movie. Hackers are breaking into other hackers’ setups,...
admin
December 7, 2024
Cybercriminals know that privileged accounts are the keys to your kingdom. One compromised account can lead to...
admin
December 7, 2024
In yet another software supply chain attack, it has come to light that two versions of a...
admin
December 7, 2024
Cybersecurity researchers have warned of a new scam campaign that leverages fake video conferencing apps to deliver...
admin
December 7, 2024
In a historic decision, Romania's constitutional court has annulled the result of the first round of voting...
admin
December 6, 2024
Cybersecurity researchers have disclosed multiple security flaws impacting open-source machine learning (ML) tools and frameworks such as...
admin
December 6, 2024
The modern business landscape is thrilling yet daunting. Rapidly evolving technology, persistent cyberthreats and escalating operational complexities...
admin
December 6, 2024
A Russian programmer accused of donating money to Ukraine had his Android device secretly implanted with spyware...
admin
December 6, 2024
The threat actors behind the More_eggs malware have been linked to two new malware families, indicating an...
admin
December 6, 2024
The threat actor known as Gamaredon has been observed leveraging Cloudflare Tunnels as a tactic to conceal...