admin
September 27, 2023
A novel side-channel attack called GPU.zip renders virtually all modern graphics processing units (GPU) vulnerable to information leakage.
"This channel...
admin
September 27, 2023
Google has assigned a new CVE identifier for a critical security flaw in the libwebp image library...
admin
September 27, 2023
Data security is in the headlines often, and it’s almost never for a positive reason. Major breaches,...
admin
September 27, 2023
A new malware strain called ZenRAT has emerged in the wild that's distributed via bogus installation packages...
admin
September 26, 2023
SOC 2, ISO, HIPAA, Cyber Essentials – all the security frameworks and certifications today are an acronym...
admin
September 26, 2023
An updated version of an Android banking trojan called Xenomorph has set its sights on more than 35 financial institutions in...
admin
September 26, 2023
Microsoft is officially rolling out support for passkeys in Windows 11 today as part of a major update to...
admin
September 26, 2023
Cybersecurity experts have shed light on a new cybercrime group known as ShadowSyndicate (formerly Infra Storm) that may have...
Critical JetBrains TeamCity Flaw Could Expose Source Code and Build Pipelines to Attackers
2 min read
admin
September 26, 2023
A critical security vulnerability in the JetBrains TeamCity continuous integration and continuous deployment (CI/CD) software could be...
Threat Report: The High Tech Industry Targeted the Most with 46% of NLX-Tagged Attack Traffic
8 min read
admin
September 26, 2023
How To Use This Report
Enhance situational awareness of techniques used by threat actors
Identify potential attacks targeting your...
admin
September 26, 2023
A "multi-year" Chinese state-sponsored cyber espionage campaign has been observed targeting South Korean academic, political, and government...
admin
September 25, 2023
Ukrainian military entities are the target of a phishing campaign that leverages drone manuals as lures to...
admin
September 25, 2023
Generative AI is a double-edged sword, if there ever was one. There is broad agreement that tools...
admin
September 25, 2023
Weak password policies leave organizations vulnerable to attacks. But are the standard password complexity requirements enough to...
admin
September 25, 2023
Tibetan, Uyghur, and Taiwanese individuals and organizations are the targets of a persistent campaign orchestrated by a...
New Report Uncovers 3 Distinct Clusters of China-Nexus Attacks on Southeast Asian Government
4 min read
admin
September 25, 2023
An unnamed Southeast Asian government has been targeted by multiple China-nexus threat actors as part of espionage...
admin
September 23, 2023
Cybersecurity researchers have discovered a previously undocumented advanced backdoor dubbed Deadglyph employed by a threat actor known as Stealth...
admin
September 23, 2023
The three zero-day flaws addressed by Apple on September 21, 2023, were leveraged as part of an iPhone exploit...
admin
September 22, 2023
An active malware campaign targeting Latin America is dispensing a new variant of a banking trojan called BBTok,...
admin
September 22, 2023
Thorough, independent tests are a vital resource for analyzing provider’s capabilities to guard against increasingly sophisticated threats...