Where Can You Promote Your Cybersecurity Webinar Online?
Photo by Chris Montgomery on Unsplash A question asked by many thoughtful professionals who produce excellent quality cybersecurity webinars and/or speak at conferences is—where should…
Photo by Chris Montgomery on Unsplash A question asked by many thoughtful professionals who produce excellent quality cybersecurity webinars and/or speak at conferences is—where should…
An attack campaign targeting HR departments and job recruiters has been stealthily compromising systems, Aryaka researchers have discovered. By avoiding analysis environments and leveraging a…
Ravie LakshmananMar 10, 2026Database Security / Vulnerability Cybersecurity researchers have disclosed nine cross-tenant vulnerabilities in Google Looker Studio that could have permitted attackers to run…
Microsoft has unveiled the next iteration of its Copilot artificial intelligence (AI) tools, which includes a tie-up with Anthropic, a company that recently took a…
A big part of a security analyst’s everyday role is figuring out what actually happened during an incident. We can do that by piecing together…
The Russian state-sponsored APT28 threat group is using a custom variant of the open-source Covenant post-exploitation framework for long-term espionage operations. Also tracked as Fancy…
Apache ZooKeeper Vulnerability Two “Important” severity vulnerabilities have been disclosed in Apache ZooKeeper, a widely used service for configuration management and naming in distributed applications,…
Cybersecurity researchers at the CERT Coordination Center (CERT/CC) have issued a warning regarding a newly disclosed evasion technique tracked as VU#976247. Threat actors are increasingly…
The notorious North Korean Lazarus Group has been caught trying to rob a CEO through a fake job interview. Just last week, the hackers used…
The late 1990s dot-com boom saw internet adoption explode, venture capital pour in, new roles appear overnight, and salaries and opportunity follow. Cybersecurity in the…
ESET researchers have traced the resurgence of Sednit through a modern toolkit built around two complementary implants, BeardShell and Covenant, each relying on a separate…
Investigators are worried that a recent attack on a critical FBI system was more than just a random hit, and that another nation-state might have…