Nvidia has reported a record quarter in its datacentre division, which posted revenue of $19.4bn, up 427% from a year…
The Akira ransomware group allegedly targeted E-T-A Elektrotechnische Apparate GmbH, an organization located in Germany. The ransomware group claims to…
A cybercriminal group is selling and distributing a sophisticated phishing kit called “V3B” through Phishing-as-a-Service (PhaaS) and self-hosting methods, which…
Zyxel has released patches for three critical vulnerabilities (CVE-2024-29972, CVE-2024-29973, and CVE-2024-29974) affecting two network-attached storage (NAS) devices that have…
Microsoft’s Recall feature has been criticized heavily by pretty much everyone since it was announced last month. Now, researchers have…
An independent study commissioned through the National Quantum Strategy by the Department for Science Innovation and Technology (DSIT) has called…
A campaign dubbed “Commando Cat” has been observed exploiting exposed Docker remote API servers to deploy cryptocurrency miners. This campaign,…
A malicious Python package named “crytic-compilers” was identified on PyPI. Masquerading as a legitimate library for intelligent contract compilation, it…
The management of day-to-day cloud security operations presents a multifaceted challenge for organizations, requiring a delicate balance between technological, procedural,…
Jun 06, 2024NewsroomEndpoint Security / Malware Threat actors are increasingly abusing legitimate and commercially available packer software such as BoxedApp…
The lucrative business model and the simplicity of running Ransomware-as-a-Service (RaaS) are driving rapid evolution and adoption. Threat actors go…
Drones have changed war. Small, cheap, and deadly robots buzz in the skies high above the world’s battlefields, taking pictures…










