Aligning Cybersecurity with Business Goals
Cybersecurity has rapidly evolved from a back-office technical concern to a boardroom imperative. As digital transformation accelerates and organizations embrace cloud computing, remote work, and…
Cybersecurity has rapidly evolved from a back-office technical concern to a boardroom imperative. As digital transformation accelerates and organizations embrace cloud computing, remote work, and…
China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one of its foremost commercial cryptography providers, resulting in the theft of…
Two individuals have been arrested in a joint international operation dismantling JokerOTP, a sophisticated phishing tool used to intercept 2FA codes and steal over £7.5…
Not every security vulnerability is high risk on its own – but in the hands of an advanced attacker, even small weaknesses can escalate into…
The UK could save £200bn if the workforce adopts artificial intelligence (AI) to improve productivity. That is the headline finding in research by Public First…
What is also clear from the documents is that US police are aware of the control corporations have over their ability to acquire vehicle location…
A security researcher has uncovered a critical vulnerability in iOS, Apple’s flagship mobile operating system. The flaw, CVE-2025-24091, which leverages the long-standing but little-known “Darwin…
PoC rootkit Curing evades traditional Linux detection systems Pierluigi Paganini April 28, 2025 Researchers created a PoC rootkit called Curing that uses Linux’s io_uring feature…
Why Application Security is Non-Negotiable The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak…
Government and telecommunications sectors in Southeast Asia have become the target of a “sophisticated” campaign undertaken by a new advanced persistent threat (APT) group called…
Attackers chained Craft CMS zero-days attacks in the wild Pierluigi Paganini April 28, 2025 Orange Cyberdefense’s CSIRT reported that threat actors exploited two vulnerabilities in…
A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including the RM4100, RM4200, EM4100, RM5110, RM5111, RG1000, RG1100, EG1000, and EG1020.…