Using emerging technology to bridge the cyber skills gap
While the UK’s cyber security skills gap is no secret, it seems there has been little progress made in solving...
Read more →While the UK’s cyber security skills gap is no secret, it seems there has been little progress made in solving...
Read more →Targus International, LLC and its affiliates fell victim to a sophisticated cyberattack. The company, an indirect subsidiary of B. Riley...
Read more →New (down)loader malware called Latrodectus is being leveraged by initial access brokers and it looks like it might have been...
Read more →Sometimes the consequences of a stolen identity exceed anything you could have imagined. Matthew David Keirans, a 58-year-old former hospital...
Read more →Police forces are checking intelligence and criminal databases following warnings of errors in data supplied to police and intelligence services...
Read more →Google announces V8 Sandbox to protect Chrome users Pierluigi Paganini April 09, 2024 Google announced support for a V8 Sandbox in the...
Read more →Threat actors have been discovered exploiting a Fortinet Forticlient EMS vulnerability to install unauthorized RMM tools and PowerShell backdoors on...
Read more →In a recent announcement, the team behind the widely acclaimed source code editor, Notepad++, has issued a call to arms...
Read more →Greece’s Ministry of Migration and Asylum has received a significant €175,000 fine for violating data and privacy protection regulations in...
Read more →Hackers always end up targeting famous YouTube channels because of their large audience base, and their aim is to exploit...
Read more →Privacy mistakes could pose a serious threat to sensitive information or systems,, which threat actors could exploit for their gain....
Read more →Apr 09, 2024NewsroomMalware / Cryptojacking Cybersecurity researchers have discovered an intricate multi-stage attack that leverages invoice-themed phishing decoys to deliver...
Read more →