Japanese video game developer Game Freak has confirmed it suffered a cyberattack in August after source code and game designs…
OilRig hackers (aka Earth Simnavaz, APT34, OilRig) is a cyber espionage group that was linked to “Iranian” interests. This APT…
The recent discovery of the TrickMo Banking Trojan variant by Cleafy has prompted further investigation, where researchers have identified 40…
Security testing plays a critical role in ensuring that applications are protected against vulnerabilities and attacks. In times when cyber…
A sophisticated supply chain attack has been identified, leveraging entry points in popular open-source package repositories, including PyPI (Python), npm…
Malware targeting Windows machines continues to be a significant threat. While these threats could be in various forms like viruses,…
The password-killing tech known as “passkeys” have proliferated over the last two years, developed by the tech industry association known…
NCC Group experts share details of how they exploited critical zero-day vulnerabilities in Phoenix Contact EV chargers (electric vehicles chargers)…
Cyble’s Vulnerability Intelligence unit has spotlighted a series of cyberattacks targeting critical vulnerabilities in various software systems, including the Ruby…
A critical security vulnerability has been identified in the popular Java security framework, pac4j, specifically affecting versions prior to 4.0….
NCC Group experts share details of how they exploited critical zero-day vulnerabilities in Phoenix Contact EV chargers (electric vehicles chargers)…
Cybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet,…










