How to to Secure Your Inboxes 2023
Email communication is still widely used as an attack vector despite the ever-changing nature of cyber threats. The vast number of people who use it…
Email communication is still widely used as an attack vector despite the ever-changing nature of cyber threats. The vast number of people who use it…
Six months into her role at real-time Norwegian graphics and live production service provider Vizrt, Petra Tesch is enjoying challenges old and new. The Stockholm-based…
MetaStealer is a new and sneaky enemy that has emerged in the field of cybersecurity. This software, which was created using the Go programming language,…
In a race against the clock to protect user security, major browser vendors, including Google and Mozilla, have rushed to release critical updates in response…
Cisco has been discovered with an arbitrary code execution flaw on their Cisco IOS XR Software image verification checks, which allows an authenticated, local attacker…
Sep 14, 2023THNSpyware / Malware The iPhone belonging to Galina Timchenko, a prominent Russian journalist and critic of the government, was compromised with NSO Group’s…
The Caesars ransomware attack and the MGM cyber attack are thought to be the work of the same threat actor conducting a series of cyber…
In a recent cyber incident, the ALPHV/BlackCat ransomware group has claimed responsibility for causing disruptions at MGM Resorts. Their method involved gaining an employee’s trust…
SolarWinds Platform has published its release notes 2023.3.1, which provides multiple bug fixes and security updates. With this release, the platform has fixed two vulnerabilities,…
Automotive industry leaders are struggling with competing cyber risk and security priorities, and as such, many are increasingly concerned that their organisations will be unprepared…
New Zealand’s public transport card service has been thrown into disarray, possibly as a result of a ransomware assault. Auckland Transport (AT) has issued an…
As per recent reports, Kubernetes has been discovered with a remote code execution vulnerability, which could allow a threat actor to execute code on the…