Florence Mottay started her career in cyber security, researching exploits for security vulnerabilities in a small US startup. Today, she…
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Surveillance camera…
A serious privilege escalation vulnerability in K7 Ultimate Security, an antivirus product from K7 Computing, was found by abusing named…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory warning about a critical remote code execution vulnerability affecting…
The working world is facing a severe resourcing crisis, with many industries finding their usual recruitment wells are running dry….
Choosing a security platform is more than just a feature-for-feature comparison. As organisations grow, the underlying architecture of their security…
The UK’s national security strategy falls short in sufficiently accounting for the digital world’s impact on our daily lives, according…
Security researchers have conducted an in-depth analysis of DragonForce ransomware that initially emerged in 2023 and has since evolved into…
A significant supply chain security breach has emerged with the discovery of Shai-Hulud 2.0, a sophisticated malware that has compromised…
A malicious Rust crate masquerading as an Ethereum Virtual Machine (EVM) utility has been caught delivering silent, OS-specific payloads to…
A new wave of attacks is exploiting legitimate Remote Monitoring and Management (RMM) tools like LogMeIn Resolve (formerly GoToResolve) and…
The API supply chain is the new security blind spot. Attackers no longer need to breach your APIs directly; they…