Apr 19, 2023Ravie LakshmananLinux / Malware The Pakistan-based advanced persistent threat (APT) actor known as Transparent Tribe used a two-factor…
Small and medium-sized enterprises (SMEs) that all too often lack the time, money or staff to implement appropriate cyber security…
A starting point for building secure application architecture, for busy developers. Software developers today are encouraged to focus on building,…
The Play ransomware group has developed two custom tools in .NET, namely Grixba and VSS Copying Tool, which it uses…
NCSC CEO Lindy Cameron has opened the agency’s annual CyberUK conference in Belfast with a call for collaboration across the…
Google has released a security update for the Chrome web browser to fix the second zero-day vulnerability found to be…
The AI landscape has started to move very, very fast: consumer-facing tools such as Midjourney and ChatGPT are now able…
Recent data breaches across CircleCI, LastPass, and Okta underscore a common theme: The enterprise SaaS stacks connected to these industry-leading…
The government’s controversial IR35 tax avoidance legislation threatens to derail the UK’s bid to become a science and technology superpower,…
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by…
Apr 19, 2023Ravie LakshmananNetwork Security / Cyber Espionage U.K. and U.S. cybersecurity and intelligence agencies have warned of Russian nation-state…
Global financial services businesses are taking part in an annual NATO cyber security exercise which tests the resilience of critical…