LockBit locked out: Cyber community reacts
News that the prolific, dangerous and feared LockBit ransomware cartel has been significantly disrupted by the UK’s National Crime Agency...
Read more →News that the prolific, dangerous and feared LockBit ransomware cartel has been significantly disrupted by the UK’s National Crime Agency...
Read more →Melbourne-headquartered email hosting provider Fastmail has said that the eSafety Commissioner’s proposed industry standards, requiring message and online file-storage providers...
Read more →VMware urged admins today to remove a discontinued authentication plugin exposed to authentication relay and session hijack attacks in Windows domain...
Read more →A critical Remote Code Execution (RCE) vulnerability in the Bricks Builder theme for WordPress has put over 25,000 websites at...
Read more →Ransomware utilizes living-off-the-land tools in Windows attacks for stealth and evasion. They can blend in with normal system activities by...
Read more →The gaming industry is experiencing unprecedented growth, propelled by technological advancements and shifting consumer preferences. As the paradigm shifts, the...
Read more →[By Brett Bzdafka, principal product manager at Blumira] Businesses today face an ever-increasing number of cyberattacks on average, often posing...
Read more →Navigating the complex world of alerts just got easier, thanks to our latest enhancements to the ThreatDown Endpoint Detection and...
Read more →Feb 20, 2024NewsroomMalware / Supply Chain Security Cybersecurity researchers have discovered two malicious packages on the Python Package Index (PyPI)...
Read more →HM Treasury has signed two three-year deals with datacentre specialist Keysource, including one involving the maintenance of the Amazon Web...
Read more →ConnectWise warned customers to patch their ScreenConnect servers immediately against a maximum severity flaw that can be used in remote...
Read more →A critical vulnerability in Microsoft Exchange Server, identified as CVE-2024-21410, has been reported to be actively exploited by threat actors. ...
Read more →