Security researchers at Elastic Security Labs have uncovered a sophisticated Linux malware dubbed PUMAKIT, which employs advanced stealth techniques and…
This year’s Black Hat Europe showcased the latest advancements in research, developments and emerging trends in cybersecurity. Being surrounded by…
Dec 13, 2024Ravie LakshmananLinux / Threat Analysis Cybersecurity researchers have uncovered a new Linux rootkit called PUMAKIT that comes with…
Dell has recently disclosed two critical security vulnerabilities affecting a wide range of its products, potentially exposing numerous systems to…
The cyberthreat landscape has shifted rapidly over the past several years, and this evolution will continue in 2025. AI has…
Regression testing is a crucial part of software development that ensures new code changes don’t negatively affect existing functionality. It…
The holiday season is a time for celebration, with organisations hosting festive parties and employees spending time with family. However,…
Experts discovered the first mobile malware families linked to Russia’s Gamaredon Pierluigi Paganini December 13, 2024 The Russia-linked APT Gamaredon…
As we move into 2025, generative AI and other emerging technologies are reshaping how businesses operate, while at the same…
The U.S. Department of Justice (DoJ) on Thursday announced the shutdown of an illicit marketplace called Rydox (“rydox.ru” and “rydox[.]cc”)…
As businesses rapidly adopt hybrid infrastructures, they’re reaping the rewards of flexibility, scalability, and innovation. However, these benefits come at…
The Cybersecurity and Infrastructure Security Agency (CISA) has updated its Public Safety Communications and Cyber Resiliency Toolkit with the release…











