The ALPHV ransomware group, also identified as Blackcat, has added a UK-based office space rental agency to its list of…
Four vulnerabilities in the TP-Link Tapo L530E smart bulb and impacting the mobile app used to control them expose users…
Aug 23, 2023THNSoftware Security / Malware More than a dozen malicious packages have been discovered on the npm package repository…
Yet again, the NoName ransomware group has targeted Norway, this time claiming an attack on nine critical infrastructures within the…
Facebook users who maintained active accounts between May 2007 and December 2022 are urged to take action and submit a…
Last May, I discovered that a critical vulnerability I had reported earlier this year had resulted in my first CVE….
In today’s fast-paced digital landscape, the role of security teams has become increasingly critical to safeguarding sensitive information and maintaining…
The opportunities and benefits of the cloud have created new business models for organisations. But at the same time, criminal…
Cybercriminals employ artificial intelligence (AI) to create complex email threats like phishing and business email compromise (BEC) attacks, while modern…
The Victorian government is claiming a success for its digital driver license (DDL) pilot in Ballarat, ahead of a statewide…
In this Help Net Security interview, Roland Atoui, Managing Director at Red Alert Labs, discusses the intricacies of transitioning from…
Palo Alto Networks has published its response to the TunnelCrack VPN eavesdropping technique that academics demonstrated earlier this month. The…