Attackers are using a tool called Evilginx to steal session cookies, letting them bypass the need for a multi-factor authentication…
The threat actor known as Water Saci is actively evolving its tactics, switching to a sophisticated, highly layered infection chain…
Florence Mottay started her career in cyber security, researching exploits for security vulnerabilities in a small US startup. Today, she…
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Surveillance camera…
A serious privilege escalation vulnerability in K7 Ultimate Security, an antivirus product from K7 Computing, was found by abusing named…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory warning about a critical remote code execution vulnerability affecting…
The working world is facing a severe resourcing crisis, with many industries finding their usual recruitment wells are running dry….
Choosing a security platform is more than just a feature-for-feature comparison. As organisations grow, the underlying architecture of their security…
The UK’s national security strategy falls short in sufficiently accounting for the digital world’s impact on our daily lives, according…
Security researchers have conducted an in-depth analysis of DragonForce ransomware that initially emerged in 2023 and has since evolved into…
A significant supply chain security breach has emerged with the discovery of Shai-Hulud 2.0, a sophisticated malware that has compromised…
A malicious Rust crate masquerading as an Ethereum Virtual Machine (EVM) utility has been caught delivering silent, OS-specific payloads to…