admin
May 14, 2024
Deploying advanced authentication measures is key to helping organizations address their weakest cybersecurity link: their human users. Having some...
admin
May 14, 2024
Cybersecurity researchers have uncovered an ongoing social engineering campaign that bombards enterprises with spam emails with the goal...
Apple and Google Launch Cross-Platform Feature to Detect Unwanted Bluetooth Tracking Devices
3 min read
admin
May 14, 2024
Apple and Google on Monday officially announced the rollout of a new feature that notifies users across...
admin
May 13, 2024
The MITRE Corporation has officially made available a new threat-modeling framework called EMB3D for makers of embedded devices used...
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
3 min read
admin
May 13, 2024
With the browser becoming the most prevalent workspace in the enterprise, it is also turning into a popular attack...
admin
May 13, 2024
In the last decade, there has been a growing disconnect between front-line analysts and senior management in...
admin
May 13, 2024
Cybersecurity researchers have disclosed multiple security flaws in Cinterion cellular modems that could be potentially exploited by...
admin
May 13, 2024
The Black Basta ransomware-as-a-service (RaaS) operation has targeted more than 500 private industry and critical infrastructure entities...
admin
May 13, 2024
Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot of the popular requests...
admin
May 11, 2024
The financially motivated threat actor known as FIN7 has been observed leveraging malicious Google ads spoofing legitimate brands as a means to deliver...
admin
May 10, 2024
The North Korean threat actor tracked as Kimsuky has been observed deploying a previously undocumented Golang-based malware...
admin
May 10, 2024
Artificial intelligence (AI) is transforming cybersecurity, and those leading the charge are using it to outsmart increasingly...
admin
May 10, 2024
Google on Thursday released security updates to address a zero-day flaw in Chrome that it said has...
admin
May 10, 2024
A guide to finding the right endpoint detection and response (EDR) solution for your business’ unique needs.
Cybersecurity has become...
admin
May 10, 2024
Malicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X (formerly Twitter) have been observed to...
admin
May 10, 2024
Cybersecurity researchers have discovered a novel attack that employs stolen cloud credentials to target cloud-hosted large language...
admin
May 10, 2024
Researchers have detailed a Virtual Private Network (VPN) bypass technique dubbed TunnelVision that allows threat actors to snoop on...
admin
May 9, 2024
Polish government institutions have been targeted as part of a large-scale malware campaign orchestrated by a Russia-linked...
admin
May 9, 2024
Cybersecurity and compliance guidance are in high demand among SMEs. However, many of them cannot afford to...
admin
May 9, 2024
Two recently disclosed security flaws in Ivanti Connect Secure (ICS) devices are being exploited to deploy the...