Multiple critical vulnerabilities were identified by the Veritas Technologies in its Enterprise Vault software that allows attackers to execute remote…
Last week on Malwarebytes Labs: Last week on ThreatDown: Stay safe! Our business solutions remove all remnants of ransomware and…
EY Identity (EYI) announces its acquisition of Melbourne-based cybersecurity consulting firm, J Group Consulting. EYI acquisition move underlines a growing…
North Korea has established a global network of highly skilled IT workers who pose as professionals from other countries to…
Microsoft has recently issued a significant warning regarding the activities of a cyber-crime group named ONNX Marketing Services, which has…
In today’s digital age, smartphones are not just tools for communication—they have become the very backbone of our daily lives,…
In this Help Net Security interview, Balázs Pózner, CEO at Hackrate, discusses the essential technical skills for ethical hackers and…
Microsoft Threat Intelligence analysts has shared new insights into North Korean and Chinese threat actors. At the recent CYBERWARCON, cybersecurity…
Cybercriminals have found a new way to exploit email security measures, turning them into tools for their malicious activities. Since…
As we continue to delegate more infrastructure operations to artificial intelligence (AI), quantum computers are advancing towards Q-day (i.e., the…
The Kali SOC in AWS project enables the deployment of a Security Operations Center (SOC) in AWS, utilizing the Kali…
A breach of telecoms companies that the United States said was linked to China was the “worst telecom hack in…











