Predictions of enterprise resource planning’s (ERP’s) demise are not new. Client-server was supposed to kill the mainframe, cloud was meant…
Cybercriminals continue to evolve their tactics for compromising systems, with recent campaigns demonstrating a significant shift from traditional fake update…
X (formerly Twitter) has announced that users who rely on security keys for two-factor authentication (2FA) must re-enroll their keys…
Linux variant of Qilin Ransomware targets Windows via remote management tools and BYOVD Pierluigi Paganini October 27, 2025 Qilin ransomware…
The notorious Mem3nt0 mori hacker group has been actively exploiting a zero-day vulnerability in Google Chrome, compromising high-profile targets across…
The sensitive personal details of more than 450 people holding “top secret” US government security clearances were left exposed online,…
A sophisticated cyber-sabotage group known as Predatory Sparrow has emerged as one of the most destructive threat actors targeting Iranian…
The ransomware group known as Qilin (aka Agenda, Gold Feather, and Water Galura) has claimed more than 40 victims every…
HashiCorp has disclosed two critical vulnerabilities in its Vault software that could allow attackers to bypass authentication controls and launch…
The rise of artificial intelligence (AI) has been met with both excitement and anxiety – a blend of optimism about…
Wordfence blocks 8.7M attacks exploiting old GutenKit and Hunk Companion flaws Pierluigi Paganini October 27, 2025 Hackers exploited old RCE…
The Australian Competition and Consumer Commission (ACCC) has initiated proceedings in the Federal Court against Microsoft Australia Pty Ltd and…











