Geacon, a Go-based implementation of the beacon from the widely abused penetration testing suite Cobalt Strike, is being used more and more…
The Indian Computer Emergency Response Team (CERT-IN) has issued an alert on vulnerabilities in VMware Aria Operations. Versions of VMware…
In December 2018 we released Hacker Dashboard, the central place for all your hacker related activities. Thanks to the community,…
In cybersecurity, a vulnerability is a weakness. It’s a bad thing. Defences must be strong, unbreakable, and hardened against threats…
Strong demand for cloud services continues to drive growth in IT spending this year, despite inflationary pressures, says Stephen Minton,…
In what seems to be a negotiation failure, the LockBit ransomware group decided to go ahead and leak the data…
“So you work in service desk? Must be soul-killing to ask people to turn their computers off and on again…
Popular social media platform Discord has notified users it has suffered a data breach after a support agent’s account at…
French electronics manufacturer Lacroix closed three factories as a result of a cyberattack they “intercepted” over the weekend, the company…
There has been a significant uptick in interest in e2e encryption as the UK Government tries to establish “back doors”…
In today’s interconnected digital landscape, the role of Chief Information Security Officers (CISOs) has continued to evolve as these dedicated…
A completely new and previously unreported form of BPFdoor was recently discovered and examined by Deep Instinct’s threat lab. The…