Hackers target and exploit GitHub repositories for a multitude of reasons and illicit purposes. The widespread use of GitHub and…
Trellix research exposes the dangers of fake antivirus websites disguised as legitimate security software but harbouring malware. Learn how to…
You’re probably familiar with the term “critical assets”. These are the technology assets within your company’s IT infrastructure that are…
The government is bringing in specialist investigators to examine whether a Post Office software application in use during the 1990s…
Security experts have disclosed advanced methods for bypassing Web Application Firewalls (WAFs) on a large scale, and they have also…
Hackers employ DNS for various purposes like redirecting traffic to enable man-in-the-middle attacks, infecting malware through harmful sites, and flooding…
Uncover IT security weaknesses and ensure compliance with infosec audits. Regular audits protect your data from breaches & meet regulations….
The threat actors behind the CatDDoS malware botnet have exploited over 80 known security flaws in various software over the…
The Metropolitan Police has confirmed it is setting up a national investigation into the Post Office scandal, although it could…
The impact of the Cencora data breach is far more widespread than earlier thought as more than a dozen pharmaceutical…
A recent data breach has reportedly compromised the personal information of Decathlon employees in Spain. The threat actor known as…
A new privilege escalation vulnerability has been discovered in Zscaler Client Connector, combining three different vulnerabilities. The three vulnerabilities were…











