Windows drivers can be abused to bypass security measures. Attackers can exploit vulnerabilities in legitimate drivers or use stolen or…
It was a privilege to meet with Saryu Nayyar, CEO of Gurucul, a prominent woman leader in the cybersecurity industry….
The landscape of cybercrime has undergone a significant transformation, with hacktivists increasingly abandoning their ideological motivations in favor of lucrative…
DICK’S Sporting Goods, the largest chain of sporting goods retail stores in the United States, disclosed that confidential information was…
The Iranian government-backed hacking group known as APT 33 has been active for more than 10 years, conducting aggressive espionage…
The eight Android and iOS apps fail to adequately protect user data, which transmits sensitive information, such as device details,…
According to the House of Commons, there were approximately 5.6 million private sector businesses in the UK as of 1…
BlackByte Ransomware group targets recently patched VMware ESXi flaw CVE-2024-37085 Pierluigi Paganini August 28, 2024 BlackByte ransomware operators are exploiting…
A significant data breach occurred at ServiceBridge, a technology company specializing in field service management. An unsecured database housing a…
Ontinue has discovered a new LummaC2 malware variant with increased activity, using PowerShell for initial infection and employing obfuscation and…
Dragos announced the latest release of the Dragos Platform, an OT network visibility and cybersecurity platform. The updates provide industrial…
Aug 28, 2024Ravie LakshmananCyber Attack / Vulnerability A South Korea-aligned cyber espionage has been linked to the zero-day exploitation of…











