Cybercriminals are notoriously good at the art of uncovering the paths of least resistance that lead to an organisation’s valuable…
The Competition and Markets Authority (CMA) has accepted a deal from Microsoft on its purchase of Activision, which will exclude…
The Known Exploited Vulnerabilities (KEV) Catalog maintained by the US cybersecurity agency CISA has led to significant improvements in federal…
Sandman APT targets telcos with LuaDream backdoor Pierluigi Paganini September 22, 2023 A previously undocumented APT dubbed Sandman targets telecommunication…
Chinese state-sponsored threat groups have targeted telecommunications, financial and government organizations in Africa in support of Beijing’s soft power agenda…
The proposed UK-US data bridge will formally open to traffic in just under three weeks, on Thursday 12 October, enabling…
Air Canada, the largest airline in the country, this week announced that the personal information of some employees was accessed…
Security researchers discovered a multi-step information stealing campaign where hackers breach the systems of hotels, booking sites, and travel agencies…
In today’s rapidly evolving digital landscape, businesses are increasingly embracing client-centric strategies to cater to the ever-changing needs and preferences…
Sep 22, 2023The Hacker NewsMITRE ATT&CK / Cybersecurity Thorough, independent tests are a vital resource for analyzing provider’s capabilities to…
The Internet Systems Consortium (ISC) has released security updates to address two remotely exploitable denial-of-service (DoS) vulnerabilities in the DNS…
Phishing is a common cyberattack technique that involves tricking users into clicking on malicious links, downloading malicious attachments, or entering…