In what appears to be a targeted cyber attack, the NDT SEC hacking group has reportedly aimed at Delta Electronics’…
Threat actors rely on the ‘versioning’ technique to evade malware detections of malicious code uploaded to the Google Play Store….
Over the past couple of years, the cost of living in the UK has increased significantly. The annual rate of…
Exploitation of the recently disclosed Ivanti Endpoint Manager Mobile (EPMM) vulnerability has started to pick up, just as the vendor…
By Ruoting Sun, Vice President of Products, Secureframe The rapid rise of cloud-first organizations has revolutionized the way businesses operate….
The continued onslaught of phishing attacks, ransomware deployment, and other exploitation is forcing the community to pay closer attention to…
Two and a quarter years after President Biden signed an Executive Order (EO) to harden the US’ cyber security defences…
Government agencies in Australia, Canada, New Zealand, the UK, and the US have published a list of the software vulnerabilities…
By Mark Guntrip, Senior Director of Cybersecurity Strategy, Menlo Security A new breed of attacker has emerged, one that has…
BEC, an acronym for Business Email Compromise, is a sophisticated form of cybercrime. Cyber threats have become a pressing concern…
The hackers behind STRRAT have adopted a new infection technique to distribute its latest version, 1.6, as highlighted by Cyble…
The parent company of Eastern Connecticut Health Network and Waterbury HEALTH, Prospect Medical Holdings, announced that all its facilities were…