Hackers target IT industries as they hold valuable data, possess critical infrastructure, and often have access to sensitive information from…
Why Zero Access Is a Better Way To Protect Your Backup Infrastructure By Greg Tevis, Vice President of Strategy, Cobalt…
May 31, 2024NewsroomThreat Detection / Endpoint Security Digital content is a double-edged sword, providing vast benefits while simultaneously posing significant…
LilacSquid APT targeted organizations in the U.S., Europe, and Asia since at least 2021 Pierluigi Paganini May 31, 2024 A…
In recent cyberattacks, hackers are actively exploiting stored cross-site scripting (XSS) vulnerabilities in various WordPress plugins. According to Fastly reports,…
A data leak incident involving Clarity.fm left the personal data of business leaders and celebrities exposed to public access. Learn…
Attackers have been exploiting CVE-2024-24919, a zero-day vulnerability in Check Point Security Gateways, to pinpoint and extract password hashes for…
Telegram, synonymous with secure messaging, has paradoxically become a tool for cybercriminals who abuse the platform’s strengths to target unsuspecting…
May 31, 2024NewsroomCyber Attack / Credential Harvesting The Russian GRU-backed threat actor APT28 has been attributed as behind a series…
A former student at the Inns of Court College of Advocacy (ICCA) says he was hauled over the coals by…
“I write to request that your agencies investigate UnitedHealth Group’s (UHG) negligent cybersecurity practices, which caused substantial harm to consumers,…
VirusTotal, a leading online service for analyzing files and URLs for viruses, worms, trojans, and other malicious content, is celebrating…











