Axel Springer has long been a pioneer in the digital publishing industry, with a vast portfolio of brands, such as…
Snatch gang claims the hack of the Department of Defence South Africa and added the military organization to its leak…
SIGN UP NOW Cyber threat adversary infrastructure refers to the combination of assets that cybercriminals and malicious actors use to…
Juniper Networks has fixed four vulnerabilities (CVE-2023-36844, CVE-2023-36845, CVE-2023-36846, CVE-2023-36847) in Junos OS that, if chained together, could allow attackers…
Tesla, the world-renowned American electric car manufacturer, revealed that the Tesla data leak, which occurred earlier this year and compromised…
Ivanti warned customers of a new critical Sentry API authentication bypass vulnerability tracked as CVE-2023-38035. The software company Ivanti released…
Aug 22, 2023THNMalware / Endpoint Security A new variant of an Apple macOS malware called XLoader has surfaced in the…
Tesla designs and manufactures several EV products, but what sets it apart from others is its cars, which are feature…
Energy One, a major player in Australia’s energy sector, has fallen victim to a cyber attack impacting corporate systems across…
Riyadh, Saudi Arabia – The future of technology convergence is set to unfold at the prestigious Emerging Tech Summit (ETS),…
DotRunpeX is one of the new and stealthiest .NET injectors that employs the “Process Hollowing” method, through which this malware…
The British government has initiated a fresh initiative named the ‘Early Warning’ program, designed to proactively alert potential targets of…