The British data and privacy watchdog plans to fine Advance Software in millions over the 2022 ransomware incident that crippled…
Phishing is the most effective method for an attacker to infiltrate an organization. Several attack methods and techniques are available…
Cequence introduced advancements to its Unified API Protection (UAP) platform, specifically tailored to support the secure use of AI applications…
SSRF—short for Server-Side Request Forgery—vulnerabilities are amongst one of the most impactful web security vulnerabilities. Even though they are less…
The notorious threat actor group XDSpy has been reported to target organizations in Russia and Moldova. The sophisticated phishing malware…
Contrast Security introduced Application Detection and Response (ADR), which empowers security teams to identify vulnerabilities, detect threats, and stop attacks…
Aug 07, 2024Ravie LakshmananAndroid / Mobile Security, Cybersecurity researchers have lifted the lid on a new technique adopted by threat…
A critical vulnerability in ServiceNow has captured the attention of cybersecurity professionals and organizations across various sectors. This issue, primarily…
To strengthen Malaysia’s cybersecurity infrastructure, Group-IB, a leader in cybersecurity technologies, has signed a Memorandum of Understanding (MOU) with CyberSecurity…
Kibana, a popular open-source data visualization and exploration tool, has identified a critical security flaw that could allow attackers to…
The rapidly expanding global data storage market is being fuelled by a range of powerful tech trends. From the exponential…
NHS England has been making headlines since 2017 due to ongoing cyber attacks and ransomware incidents. Recently, the non-profit organization…











