The hackers weaponize 7zip files to pass through security measures and deliver malware effectively. These archived files can hide malicious…
Jul 16, 2024NewsroomData Security / Vulnerability An advanced persistent threat (APT) group called Void Banshee has been observed exploiting a…
Finland’s technology sector has raised strong opposition to new labour market-based anti-immigration legislation that threatens to derail plans by business…
Kaspersky leaves U.S. market following the ban on the sale of its software in the country Pierluigi Paganini July 16,…
Hackers target legitimate Remote Monitoring and Management (RMM) tools as they provide powerful, trusted access to systems and networks. This…
X-Labs identified basic ransomware targeting Turkish businesses, delivered via PDF attachments in suspicious emails from the internet[.]ru domain. PDF links…
NST Cyber, a cybersecurity solutions provider, has announced the appointment of Pradeep Kumar as its Chief Product Architect. Under his…
A critical vulnerability has been discovered in the popular Profile Builder and Profile Builder Pro plugins, with over 50,000 active…
Cyble Research & Intelligence Labs (CRIL) researchers have identified a cyber threat targeting the upcoming Paris Olympics. On June 23,…
The ability to swiftly and accurately analyze malware is paramount. Traditional reverse engineering and code analysis methods are often too…
Venkatesh Sundar, Founder and President, Americas, Indusface Application programming interfaces or APIs are crucial for exchanging data between various software…
The Cybersecurity and Infrastructure Security Agency (CISA) of the United States has issued a critical security advisory regarding vulnerabilities in…











