Multiple APT groups exploited WinRAR flaw CVE-2023-38831 Pierluigi Paganini October 19, 2023 Google TAG reported that both Russia and China-linked…
An ongoing attack on government agencies in the APAC region has been claimed to have compromised a secure USB device…
The era of AI has proven that machine learning technologies have a unique and effective capability to streamline processes that…
Microsoft has been experimenting with glass as a data storage medium for some years, and is now pivoting that research…
It’s always DNS. That’s what the famous internet meme popular among sysadmins says anyway. It’s funny because while clearly, every…
Cybersecurity could be as easy as 1-2-3. The problem, though, is that people have to want it. Cybersecurity could be…
Oct 19, 2023NewsroomCyber Threat / Vulnerability A number of state-back threat actors from Russia and China have been observed exploiting…
In many cases, senior executives/line-of-business leaders are minimally engaged in their company’s cyber preparedness initiatives — only 33% of CEOs…
Threat actors are doubling down on brand impersonation by using lookalike domain names. Threat actors are known for impersonating popular…
Over 80% of northern European organizations emphasize that the need to ensure business resilience is the top driver for their…
The critical bug in some Citrix NetScaler products patched last week remains under exploitation, according to security researchers from Mandiant….
The FBI also warns that cybercriminals are using this stolen data to extort victims, threatening to release it to the…