A LockBit affiliate has been observed deploying a new ransomware family in a recent attack, after LockBit’s execution was blocked,…
According to recent reports, a threat actor known as Storm-0324 has been using email-based initial infection vectors to attack organizations….
Sep 14, 2023THNVulnerability / Hacking A high-severity security flaw has been disclosed in N-Able’s Take Control Agent that could be…
A known ransomware gang has taken credit for the highly disruptive attack on MGM Resorts, and the hospitality and entertainment…
Email communication is still widely used as an attack vector despite the ever-changing nature of cyber threats. The vast number…
Six months into her role at real-time Norwegian graphics and live production service provider Vizrt, Petra Tesch is enjoying challenges…
MetaStealer is a new and sneaky enemy that has emerged in the field of cybersecurity. This software, which was created…
In a race against the clock to protect user security, major browser vendors, including Google and Mozilla, have rushed to…
Cisco has been discovered with an arbitrary code execution flaw on their Cisco IOS XR Software image verification checks, which…
NIST released Special Publication (SP) 800-207A – “A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Location…
Sep 14, 2023THNSpyware / Malware The iPhone belonging to Galina Timchenko, a prominent Russian journalist and critic of the government,…
The Caesars ransomware attack and the MGM cyber attack are thought to be the work of the same threat actor…