The FBI has issued a Private Industry Notification (PIN) warning of vulnerabilities in the US Renewable Energy Sector to cyber-attacks….
Cybersecurity teams probably have their work cut out right now, just looking at Ransomware Attacks alone. Every 14 Seconds, a…
CSHARP-STREAMER, a Remote Access Trojan (RAT), was identified during an investigation of a ransomware attack using Metaencryptor, with a Powershell…
Cisco has disclosed a critical vulnerability in its widely-used NX-OS network operating system that could allow attackers to execute arbitrary…
In February 2024, Prudential Financial reported it had fallen victim to a ransomware attack. The attack was discovered one day…
Multiple owners of Google Pixel 6 series phones (6, 6a, 6 Pro) have been reporting in the past week that…
Multiple vulnerabilities in the CocoaPods dependency manager have been identified, posing a significant risk of supply chain attacks. The flaw…
Polyglot files have to fit in several file format specifications and respond differently depending on the calling program. This poses…
Healthcare and technology increasingly intersect in today’s world, and cybersecurity has become a primary concern for many companies. However, the…
Google offers up to $250,000 for finding security holes in KVM, a key technology for virtual machines. This bug bounty…
02 Jul Looking Back On The Brain Computer Virus – 1986 Posted at 08:50h in Blogs by Di Freeze This…
Staff retention is currently a huge issue for companies across all industries, but nowhere more so than in the tech…










