Fewer organizations are paying the ransom when confronted with a ransomware attack – but those that do make ransomware payments…
The Australian arm of Malaysian-owned medical clinic operator, Qualitas Health, has rolled out a Google Gemini-based document processing agent across…
CISA has confirmed that an Oracle E-Business Suite flaw tracked as CVE-2025-61884 is being exploited in attacks, adding it to its…
The emergence of the AdaptixC2 post-exploitation framework in 2025 marked a significant milestone in the evolution of attacker toolsets targeting…
A group of state-sponsored (APT) actors, known as Salt Typhoon, remains a significant threat to networks across the globe, reveals…
The Federal Court of Australia is set to move its CourtPath case and document management system to run in Azure,…
Japanese retailer Muji halted online sales after a ransomware attack on logistics partner Pierluigi Paganini October 21, 2025 Muji halted…
Cybersecurity is not just about defense; it is about protecting profits. Organizations without modern threat intelligence (TI) face escalating breach…
A sophisticated phishing campaign orchestrated by Pakistan-linked threat actors has been discovered targeting Indian government entities by impersonating the National…
The prolific threat actors behind the Lumma Stealer malware have been slowed by an underground doxxing campaign in recent months….
Microsoft has confirmed that Windows updates released since August 29, 2025, are breaking authentication on systems sharing Security Identifiers. Windows…
Microsoft has acknowledged a significant authentication problem affecting users of recent Windows versions, stemming from security enhancements in updates released…











