Distributed denial of service attacks rose sharply during the third-quarter, fueled by record-level attacks from the Aisuru botnet, comprising between…
Microsoft has silently “mitigated” a high-severity Windows LNK vulnerability exploited by multiple state-backed and cybercrime hacking groups in zero-day attacks….
The decentralized finance sector witnessed a devastating breach targeting Yearn Finance’s yETH pool, resulting in the theft of approximately $9…
In a brazen attempt to exploit the chaotic pre-holiday rush, Microsoft Security has detected and dismantled a large-scale phishing campaign…
Attackers are using a tool called Evilginx to steal session cookies, letting them bypass the need for a multi-factor authentication…
The threat actor known as Water Saci is actively evolving its tactics, switching to a sophisticated, highly layered infection chain…
Florence Mottay started her career in cyber security, researching exploits for security vulnerabilities in a small US startup. Today, she…
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Surveillance camera…
A serious privilege escalation vulnerability in K7 Ultimate Security, an antivirus product from K7 Computing, was found by abusing named…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory warning about a critical remote code execution vulnerability affecting…
The working world is facing a severe resourcing crisis, with many industries finding their usual recruitment wells are running dry….
Choosing a security platform is more than just a feature-for-feature comparison. As organisations grow, the underlying architecture of their security…
