APT36 Customized Malware to Attack Indian Government Servers
APT36 is a highly sophisticated APT (Advanced Persistent Threat) group that is known for conducting targeted espionage in South Asia and is strongly linked to…
APT36 is a highly sophisticated APT (Advanced Persistent Threat) group that is known for conducting targeted espionage in South Asia and is strongly linked to…
Purism introduced the new Librem 11 tablet running secure PureBoot and Linux kernel-based PureOS. Librem 11 is made for individuals, organizations, government agencies, law enforcement…
Threat actor leaks sensitive data belonging to Airbus Pierluigi Paganini September 14, 2023 The multinational aerospace corporation Airbus has launched an investigation into the recent leak of…
On Monday, September 11th, 2023, MGM Resorts and Hotels, a colossal entity valued at over $14 billion, found itself in the crosshairs of a meticulously…
The ultimate guide covers everything you need to know about the entry-level Certified in Cybersecurity certification and how to get started with FREE training and…
Vocus has called for new submarine cable protection zones, to reflect the burgeoning deployment of cables away from the existing zones in Sydney and Perth.…
All employees need security training, yet it’s generally a resented afterthought. A variety of studies over years show that human error is generally felt to…
A hacking group named Scattered Spider brought down the systems of the US$14 billion ($21.7 billion) gaming giant MGM Resorts International this week, as US…
Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise…
The US Justice Department has sought to show how Google did all it could to get people to use its search engine and build itself…
60% of cyberattacks against the industrial sector are led by state-affiliated actors and often unintentionally enabled by internal personnel (about 33% of the time), according…
NAB wants the governent to impose minimum cyber security standards on cloud providers, due to the power imbalance in trying to negotiate clauses into cloud…