A new campaign of social engineering activity targeting organisations of interest to Russian intelligence has been observed in the wild,…
India will impose a licensing requirement for imports of laptops, tablets and personal computers with immediate effect, a move that…
I hope you’ve been doing well! Hack Week This week we had people fly in from all over the world…
In collaboration with CISA, the NSA, and the FBI, Five Eyes cybersecurity authorities have issued today a list of the…
The Qualys Cloud Platform now includes new capabilities for assessing risks in first-party applications. Customers can “bring their own” assessment…
A Russian government-linked hacking group took aim at dozens of global organisations with a campaign to steal login credentials by…
Dozens of vulnerabilities impacting the Milesight UR32L industrial router could be exploited to execute arbitrary code or commands, Cisco’s Talos…
The frequency and complexity of cyber threats are constantly evolving. At the same time, organizations are now collecting sensitive data…
Most medical infusion pumps sold via secondary market sources still contain Wi-Fi configuration settings from the original organization that deployed…
Lineaje unveiled BOMbots, AI-based automation bots that deliver optimized recommendations and remediations across the entire supply chain. These AI-based automation…
Cloud security specialist Qualys has provided its view of the top five cloud security risks, drawing insights and data from…
OWASP released the OWASP Top 10 for LLM (Large Language Model) Applications project, which provides a list of the top…