In August 2024, researchers detected a malicious Google Chrome browser infection that led to the distribution of LummaC2 stealer malware…
Among the various factors that contribute to an effective security strategy, threat intelligence collaboration and information sharing play a crucial…
The NoName ransomware gang has been trying to build a reputation for more than three years targeting small and medium-sized businesses…
Earth Preta, also known as Mustang Panda, Bronze President, RedDelta, and Red Lich, is a sophisticated Chinese APT group that…
The air-gap data protection method isolates local networks from the internet to mitigate cyber threats and protect sensitive data, which…
Groundbreaking technology integrates Post-Quantum Cryptography and SSL security for the next generation of Face-based eID solutions and Face-protected Digital Public…
Open-source cybersecurity tools provide transparency and flexibility, allowing users to examine and customize the source code to fit specific security…
Sep 10, 2024Ravie LakshmananCyber Attack / Malware The threat actor tracked as Mustang Panda has refined its malware arsenal to…
The Indian government is planning to train and prepare 5,000 cyber commandos over the next five years to deal with…
A security vulnerability, identified as CVE-2024-7591, has been disclosed affecting all versions of LoadMaster and the LoadMaster Multi-Tenant (MT) hypervisor….
A CI/CD pipeline is a series of automated steps that helps software teams deliver code faster, safer, and more reliably. …
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about three critical vulnerabilities currently being exploited in…











