Malicious Google ads are a well known threat, but malvertising can also be found on other popular online destinations such…
Jul 16, 2024NewsroomOpen Source / Software Supply Chain Cybersecurity researchers have identified two malicious packages on the npm package registry…
The FBI revealed on Monday that they have achieved access to the phone of the alleged shooter, Thomas Matthew Crooks,…
The hackers weaponize 7zip files to pass through security measures and deliver malware effectively. These archived files can hide malicious…
Jul 16, 2024NewsroomData Security / Vulnerability An advanced persistent threat (APT) group called Void Banshee has been observed exploiting a…
Finland’s technology sector has raised strong opposition to new labour market-based anti-immigration legislation that threatens to derail plans by business…
Kaspersky leaves U.S. market following the ban on the sale of its software in the country Pierluigi Paganini July 16,…
Hackers target legitimate Remote Monitoring and Management (RMM) tools as they provide powerful, trusted access to systems and networks. This…
X-Labs identified basic ransomware targeting Turkish businesses, delivered via PDF attachments in suspicious emails from the internet[.]ru domain. PDF links…
NST Cyber, a cybersecurity solutions provider, has announced the appointment of Pradeep Kumar as its Chief Product Architect. Under his…
A critical vulnerability has been discovered in the popular Profile Builder and Profile Builder Pro plugins, with over 50,000 active…
Cyble Research & Intelligence Labs (CRIL) researchers have identified a cyber threat targeting the upcoming Paris Olympics. On June 23,…











