Expert Insight: ‘Minding the gap’: how can we work to make cyber accessible for women?
According to the Department for Science, Innovation and Technology (DSIT), only 17% of the UK cyber sector workforce is female,...
Read more →According to the Department for Science, Innovation and Technology (DSIT), only 17% of the UK cyber sector workforce is female,...
Read more →Hackers are now using steganography techniques to distribute the notorious Remote Access Trojan (RAT) known as RemcosRAT. This method, which...
Read more →Researchers have brought to light a new attack method – dubbed TunnelVision and uniquely identified as CVE-2024-3661 – that can...
Read more →Hackers exploit the weaponized shortcut files due to their ability to execute malicious code without knowing the user being targeted....
Read more →By Claude Mandy, Chief Evangelist at Symmetry Systems Organizations depend on data to operate. From day-to-day operations to strategic decisions,...
Read more →A critical vulnerability in CrushFTP, identified as CVE-2024-4040, has been actively exploited in the wild. It allows attackers to perform...
Read more →08 May Backstory Of The World’s Second CISO Posted at 08:51h in Blogs by Di Freeze This week in cybersecurity...
Read more →MITRE has shared a timeline of the recent breach if fell victim to and has confirmed that it began earlier...
Read more →״Defenders think in lists, attackers think in graphs,” said John Lambert from Microsoft, distilling the fundamental difference in mindset between...
Read more →A new UPS management vulnerability in CyberPower Uninterrupted Power Supply (UPS) management software has been uncovered, revealing multiple flaws that have...
Read more →LiteSpeed Cache WordPress plugin actively exploited in the wild Pierluigi Paganini May 08, 2024 Threat actors are exploiting a high-severity...
Read more →A new group known as MorLock ransomware has intensified its attacks on Russian businesses, causing disruptions and financial losses. This...
Read more →