The Australian Signals Directorate has run as many as 50 offensive cyber security actions in the past year. Director-general Rachel…
A significant data breach was uncovered at Redcliffe Labs, a leading Indian diagnostic service provider, where over 12 million healthcare…
A BitLocker recovery key is a unique 48-character alphanumeric code generated when you enable BitLocker to drive encryption on a…
In June, a new campaign targeting iPhone and iPad devices was named “TriangleDB.” This malware infection chain consists of a…
Akira is an information stealer malware that was found in March 2023. This malware can steal sensitive information, including saved…
VMWare has issued an update to address out-of-bounds write and information disclosure vulnerabilities in its server management software, vCenter Server….
The infamous BlackBasta ransomware group has allegedly expanded its list of victims to include Fortive, a global industrial technology company…
Winter Vivern APT exploited zero-day in Roundcube webmail software in recent attacks Pierluigi Paganini October 26, 2023 Russia-linked threat actor…
The sharp increase in attacks on operational technology (OT) systems can be primarily attributed to two key factors: the escalating…
Game of Active Directory (GOAD) is a free pentesting lab. It provides a vulnerable Active Directory environment for pen testers…
Q3 of 2023 continued an ongoing surge in ransomware activity, according to GuidePoint Security. GuidePoint Research and Intelligence Team (GRIT)…
Many CISOs are grappling with the conundrum of the purpose and value of security controls data in supporting critical business…