A new ransomware named ‘8Base’ is on the prowl and seems to be only targeting companies that do not show…
Fewer than one in ten CIOs can claim that they have avoided a network outage, according to Opengear. This finding…
Jun 29, 2023Ravie LakshmananCyber Threat / Hacking A previously undocumented Windows-based information stealer called ThirdEye has been discovered in the…
Many popular generative AI projects are an increased security threat and open-source projects that utilize insecure generative AI and LLMs…
In 2022, the total number of DDoS attacks worldwide increased by 115.1% over the amount observed in 2021, according to…
Attack surface expansion is a byproduct of doing business today, especially for enterprises that rely on the cloud. As businesses…
We take a look at a debate over who is responsible for ensuring surveillance systems are as secure as they…
We take a look at why blocking adverts and tracking is one of the best things you can do to…
Europol has published the results of an infiltration operation on EncroChat, a secure communications system set up by and for…
Establishing secure access to your cloud MRP system forms the foundation of robust data protection. Let’s dive into the ins…
Electromagnetic fault injection (EMFI) attacks on drones can potentially allow attackers to achieve arbitrary code execution and take over them….
Microsoft has released Sysmon 15, converting it into a protected process and adding the new ‘FileExecutableDetected’ option to log when…