The rise of sophisticated cyberattacks and increasingly brazen attackers is a well-established threat. Businesses and organizations need to take action…
GraphQL is a widely used query language that provides developers with the ability to query data easily. Unlike via a…
A threat actor known as ShinyHunters is claiming to be selling a massive trove of Santander Bank data, including information…
Hackers often target the routers to take charge of network traffic, get hold of sensitive data, and attack attached devices….
Attackers in South Korea are distributing malware disguised as cracked software, including RATs and crypto miners, and registering themselves with…
Every January, the global campaign Data Privacy Week heightens awareness about safeguarding personal data and instructs organizations on effective data…
Fujitsu is set to receive a further £180m in taxpayers’ cash to extend its contract to run the controversial Post…
A convincing phishing scam recently targeted a cybersecurity researcher’s (Jonathan Munshaw) wife with a fake text claiming she owed unpaid…
Active dark web Intelligence to aid M&A By Shawn Loveland, COO, Resecurity Every industry-leading company has gone through mergers and…
Ever since Russia’s invasion of Ukraine on February 24, 2022, there have been heavy tensions between the nations and worldwide….
This past year showed us that the ransomware landscape is only getting increasingly sophisticated. This can be seen through ransomware…
Microsoft has emphasized the need for securing internet-exposed operational technology (OT) devices following a spate of cyber attacks targeting such…











