New Zealand’s public transport card service has been thrown into disarray, possibly as a result of a ransomware assault. Auckland…
As per recent reports, Kubernetes has been discovered with a remote code execution vulnerability, which could allow a threat actor…
Kubernetes flaws could lead to remote code execution on Windows endpoints Pierluigi Paganini September 14, 2023 Researchers discovered three security…
APT36 is a highly sophisticated APT (Advanced Persistent Threat) group that is known for conducting targeted espionage in South Asia…
Purism introduced the new Librem 11 tablet running secure PureBoot and Linux kernel-based PureOS. Librem 11 is made for individuals,…
Threat actor leaks sensitive data belonging to Airbus Pierluigi Paganini September 14, 2023 The multinational aerospace corporation Airbus has launched an investigation…
On Monday, September 11th, 2023, MGM Resorts and Hotels, a colossal entity valued at over $14 billion, found itself in…
The ultimate guide covers everything you need to know about the entry-level Certified in Cybersecurity certification and how to get…
Vocus has called for new submarine cable protection zones, to reflect the burgeoning deployment of cables away from the existing…
All employees need security training, yet it’s generally a resented afterthought. A variety of studies over years show that human…
A hacking group named Scattered Spider brought down the systems of the US$14 billion ($21.7 billion) gaming giant MGM Resorts…
Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful…